Patents by Inventor Chandramohan Thekkath
Chandramohan Thekkath has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7630998Abstract: The addition of a layer between a tree data storage structure and a persistent storage is disclosed. The additional layer, called a storage module, generates an identifier and allocates it to a node in the tree data storage structure. The storage module additionally performs a mapping function, allocating the identifier to a location in persistent storage. If the node is later deleted from the tree data storage structure, then the mapping of the identifier to the location in persistent storage is likewise deleted. In this way, if the node is deleted and, concurrently, a lookup or write operation is attempted on the deleted node, the storage module will read the identifier associated with the deleted node but will not be able to map the identifier to a location in persistent storage. Instead, an exception is generated and sent to the tree data storage module.Type: GrantFiled: June 10, 2005Date of Patent: December 8, 2009Assignee: Microsoft CorporationInventors: Lidong Zhou, Chandramohan A. Thekkath
-
Publication number: 20090271707Abstract: An enhancement to a web browser offers an extension mechanism for web applications to utilize client-side resources, thereby moving more extensibility and flexibility to the client-side. The web browser may expose some control interfaces to meet various requirements from web applications. Using the extension mechanism, the web applications are able to offload the cloud servers, function when offline, and improve performance. The extension mechanism also provides users with full control to the data passing through their web browsers.Type: ApplicationFiled: April 23, 2008Publication date: October 29, 2009Applicant: MICROSOFT CORPORATIONInventors: Shiding Lin, Lidong Zhou, Chandramohan A. Thekkath, Dahlia Malkhi, Zheng Zhang
-
Patent number: 7558217Abstract: A network includes multiple segments and bridges interconnecting the segments, with hosts coupled to the segments. The bridges are smart bridges that each perform a host location initialization function. The host location initialization function in one bridge is performed in corporation with all other bridges in the bridged network via an instance through a propagation order spanning tree (POST). The initialization method includes obtaining prior host location information which is at least a partial representation of the host locations in the bridged network before the network topology change, obtaining hints on host location changes resulting from the network topology change, and modifying the prior host location information according to the hints to construct host location information for initialization. Location information for at least a portion of the hosts in the bridged network is preserved or discovered quickly each time when the network topology changes.Type: GrantFiled: August 15, 2003Date of Patent: July 7, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Thomas Lee Rodeheffer, Mark D. Lillibridge, Chandramohan A. Thekkath
-
Patent number: 7542431Abstract: Nodal pattern configuration is described, including generating successive values at a source node, processing the successive values using a plurality of intermediate nodes, sending the processed values from a node in the plurality of intermediate nodes to a destination node, and configuring the plurality of intermediate nodes such that each node of the plurality of intermediate nodes, concurrently performs at least two actions. Also, nodal pattern configuration includes generating a series of data blocks at a source node, processing data blocks from the series of data blocks using a plurality of intermediate nodes in data communication with the source node, each node of the plurality of intermediate nodes being configured to concurrently perform at least two operations, and sending processed data blocks from the plurality of intermediate nodes to a destination node, the destination node being in data communication with the plurality of intermediate nodes.Type: GrantFiled: March 31, 2005Date of Patent: June 2, 2009Assignee: Microsoft CorporationInventors: Mark Steven Manasse, Alice Silverberg, Chandramohan A. Thekkath
-
Patent number: 7529891Abstract: Balanced prefetching automatically balances the benefits of prefetching data that has not been accessed recently against the benefits of caching recently accessed data, and can be applied to most types of structured data without needing application-specific details or hints. Balanced prefetching is performed in applications in a computer system, such as storage-centric applications, including file systems and databases. Balanced prefetching exploits the structure of the data being prefetched, providing superior application throughput. For a fixed amount of memory, it is automatically and dynamically determined how much memory should be devoted to prefetching.Type: GrantFiled: September 19, 2005Date of Patent: May 5, 2009Assignee: Microsoft CorporationInventors: Chandramohan A. Thekkath, John P. MacCormick, Lidong Zhou, Nicholas Charles Murphy
-
Publication number: 20080313496Abstract: Multiple versions of data on different sets of machines allow a system to degrade gracefully even when experiencing excessive failures. When excessive failures cause the latest versions to be unavailable, the system becomes degraded, but still offers an old version if available. A most recent coherent set of the available older versions is found and provided. The degree of degradation increases gradually as the system experiences more and more failures. Graceful degradation is desirably complementary to fault tolerance.Type: ApplicationFiled: June 12, 2007Publication date: December 18, 2008Applicant: Microsoft CorporationInventors: Vijayan Prabhakaran, Venugopalan Ramasubramanian, Lidong Zhou, Roy Levin, Chandramohan A. Thekkath
-
Publication number: 20080215450Abstract: Remote provisioning of an IT network and/or associated services is provided. Hardware, software, service and/or expertise can be moved from on-premise to a remote location (e.g., central, distributed . . . ). Accordingly, at least a large degree computation can be moved to the center to exploit economies of scale, among other things. In such an architecture, computational resources (e.g., data storage, computation power, cache . . . ) can be pooled, and entities can subscribe to a particular level of resources related to a private entity IT network.Type: ApplicationFiled: September 28, 2006Publication date: September 4, 2008Applicant: MICROSOFT CORPORATIONInventors: William H. Gates, Raymond E. Ozzie, Gary W. Flake, Thomas F. Bergstraesser, Arnold N. Blinn, Christopher W. Brumme, Lili Cheng, Nishant V. Dani, Daniel S. Glasser, Alexander G. Gounares, Galen C. Hunt, James R. Larus, Matthew B. MacLaurin, Henricus Johannes Maria Meijer, Debi P. Mishra, Amit Mital, Ira L. Snyder, Chandramohan A. Thekkath
-
Publication number: 20080165701Abstract: A system is disclosed for collaborative downloading that uses both the WLAN and the WWAN in combination, in an attempt to bridge the range-speed dichotomy. Devices in close vicinity band together their WWAN links, with the high-speed WLAN serving as the glue, to boost the effective wide-area bandwidth available to the active nodes.Type: ApplicationFiled: June 20, 2007Publication date: July 10, 2008Applicant: MICROSOFT CORPORATIONInventors: Ganesh Ananthanarayanan, Venkata N. Padmanabhan, Chandramohan A. Thekkath, Lenin Ravindranath Sivalingam
-
Publication number: 20080082393Abstract: Personal data mining mechanisms and methods are employed to identify relevant information that otherwise would likely remain undiscovered. Users supply personal data that can be analyzed in conjunction with data associated with a plurality of other users to provide useful information that can improve business operations and/or quality of life. Personal data can be mined alone or in conjunction with third party data to identify correlations amongst the data and associated users. Applications or services can interact with such data and present it to users in a myriad of manners, for instance as notifications of opportunities.Type: ApplicationFiled: September 28, 2006Publication date: April 3, 2008Applicant: MICROSOFT CORPORATIONInventors: Raymond E. Ozzie, William H. Gates, Gary W. Flake, Thomas F. Bergstraesser, Arnold N. Blinn, Christopher W. Brumme, Lili Cheng, Michael Connolly, Nishant V. Dani, Dane A. Glasgow, Daniel S. Glasser, Alexander G. Gounares, James R. Larus, Matthew B. MacLaurin, Henricus Johannes Maria Meijer, Debi P. Mishra, Amit Mital, Ira L. Snyder, Chandramohan A. Thekkath, David R. Treadwell, Melora Zaner-Godsey
-
Publication number: 20080082467Abstract: Personal data mining mechanisms and methods are employed to identify relevant information that otherwise would likely remain undiscovered. Users supply personal data that can be analyzed in conjunction with data associated with a plurality of other users to provide useful information that can improve business operations and/or quality of life. Personal data can be mined alone or in conjunction with third party data to identify correlations amongst the data and associated users. Applications or services can interact with such data and present it to users in a myriad of manners, for instance as notifications of opportunities.Type: ApplicationFiled: December 20, 2006Publication date: April 3, 2008Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, William H. Gates, Raymond E. Ozzie, Gary W. Flake, Thomas F. Bergstraesser, Arnold N. Blinn, Christopher W. Brumme, Lili Cheng, Michael Connolly, Nishant V. Dani, Dane A. Glasgow, Daniel S. Glasser, Alexander G. Gounares, James R. Larus, Matthew B. MacLaurin, Debi P. Mishra, Amit Mital, Ira L. Snyder, Chandramohan A. Thekkath, David R. Treadwell, Melora Zaner-Godsey
-
Publication number: 20080082465Abstract: An intelligent personalized agent monitors, regulates, and advises a user in decision-making processes for efficiency or safety concerns. The agent monitors an environment and present characteristics of a user and analyzes such information in view of stored preferences specific to one of multiple profiles of the user. Based on the analysis, the agent can suggest or automatically implement a solution to a given issue or problem. In addition, the agent can identify another potential issue that requires attention and suggests or implements action accordingly. Furthermore, the agent can communicate with other users or devices by providing and acquiring information to assist in future decisions. All aspects of environment observation, decision assistance, and external communication can be flexibly limited or allowed as desired by the user.Type: ApplicationFiled: December 20, 2006Publication date: April 3, 2008Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, William H. Gates, Raymond E. Ozzie, Gary W. Flake, Thomas F. Bergstraesser, Arnold N. Blinn, William J. Bolosky, Christopher W. Brumme, Lili Cheng, Michael Connolly, Dane A. Glasgow, Daniel S. Glasser, Alexander G. Gounares, James R. Larus, Matthew B. MacLaurin, Debi P. Mishra, Amit Mital, Ira L. Snyder, Chandramohan A. Thekkath, Melora Zaner-Godsey
-
Publication number: 20080082670Abstract: A system and method that facilitates and effectuates communications between disparate clients that reside in a network topology (e.g., cloud). The system and method provides a component that receives one or more prospective end points, a set of desired communication criteria/characteristics, and desired content extant on one of the clients that reside on network topology. Additionally, the system and method provides a component that establishes communications pathways to one or more prospective end points or to subsequently identified end points to facilitate transfer of desired content from the end point to a requesting client.Type: ApplicationFiled: September 28, 2006Publication date: April 3, 2008Applicant: MICROSOFT CORPORATIONInventors: Alexander G. Gounares, Raymond E. Ozzie, Gary W. Flake, Thomas F. Bergstraesser, Arnold N. Blinn, William J. Bolosky, Christopher W. Brumme, Dane A. Glasgow, Daniel S. Glasser, Matthew B. MacLaurin, Michael Maggs, Henricus Johannes Maria Meijer, Debi P. Mishra, Kartik N. Raghavan, Ira L. Snyder, Chandramohan A. Thekkath, David R. Treadwell
-
Publication number: 20080082546Abstract: Remote provisioning of an IT network and/or associated services is provided. Hardware, software, service and/or expertise can be moved from on-premise to a remote location (e.g., central, distributed . . . ). Accordingly, at least a large degree computation can be moved to the center to exploit economies of scale, among other things. In such an architecture, computational resources (e.g., data storage, computation power, cache . . . ) can be pooled, and entities can subscribe to a particular level of resources related to a private entity IT network.Type: ApplicationFiled: December 20, 2006Publication date: April 3, 2008Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, William H. Gates, Raymond E. Ozzie, Gary W. Flake, Thomas F. Bergstraesser, Arnold N. Blinn, Christopher W. Brumme, Lili Cheng, Nishant V. Dani, Daniel S. Glasser, Alexander G. Gounares, Galen C. Hunt, James R. Larus, Matthew B. MacLaurin, Debi P. Mishra, Amit Mital, Ira L. Snyder, Chandramohan A. Thekkath
-
Publication number: 20080082652Abstract: The claimed subject matter provides systems and/or methods that facilitate replicating a state associated with a client, user, service, application, and the like. A third party service provider can support any number of services that can be concurrently requested by several clients without user perception of degraded computing performance as compared to conventional systems/techniques due to improved connectivity and mitigated latencies. A replication component can generate replicas of states associated with requested services. Further, the replicas can facilitate seamlessly interacting with the third party service provider (e.g., while transitioning between client devices). Additionally, by providing replicas of the state related information, differing third party service providers can effectuate services based upon a request from a client without regenerating the state.Type: ApplicationFiled: September 28, 2006Publication date: April 3, 2008Applicant: MICROSOFT CORPORATIONInventors: William H. Gates, Gary W. Flake, James R. Larus, Debi P. Mishra, Chandramohan A. Thekkath, Raymond E. Ozzie, Lili Cheng, Nishant V. Dani, Daniel S. Glasser, Alexander G. Gounares, Henricus Johannes Maria Meijer, Amit Mital, Ira L. Snyder
-
Publication number: 20080082667Abstract: Remote provisioning of an IT network and/or associated services is provided. Hardware, software, service and/or expertise can be moved from on-premise to a remote location (e.g., central, distributed . . . ). Accordingly, at least a large degree computation can be moved to the center to exploit economies of scale, among other things. In such an architecture, computational resources (e.g., data storage, computation power, cache . . . ) can be pooled, and entities can subscribe to a particular level of resources related to a private entity IT network.Type: ApplicationFiled: December 20, 2006Publication date: April 3, 2008Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, William H. Gates, Raymond E. Ozzie, Gary W. Flake, Thomas F. Bergstraesser, Arnold N. Blinn, Christopher W. Brumme, Lili Cheng, Nishant V. Dani, Daniel S. Glasser, Alexander G. Gounares, Galen C. Hunt, James R. Larus, Matthew B. MacLaurin, Debi P. Mishra, Amit Mital, Ira L. Snyder, Chandramohan A. Thekkath
-
Publication number: 20080082464Abstract: An intelligent personalized agent monitors, regulates, and advises a user in decision-making processes for efficiency or safety concerns. The agent monitors an environment and present characteristics of a user and analyzes such information in view of stored preferences specific to one of multiple profiles of the user. Based on the analysis, the agent can suggest or automatically implement a solution to a given issue or problem. In addition, the agent can identify another potential issue that requires attention and suggests or implements action accordingly. Furthermore, the agent can communicate with other users or devices by providing and acquiring information to assist in future decisions. All aspects of environment observation, decision assistance, and external communication can be flexibly limited or allowed as desired by the user.Type: ApplicationFiled: September 28, 2006Publication date: April 3, 2008Applicant: MICROSOFT CORPORATIONInventors: Raymond E. Ozzie, William H. Gates, Gary W. Flake, Thomas F. Bergstraesser, Arnold N. Blinn, William J. Bolosky, Christopher W. Brumme, Lili Cheng, Michael Connolly, Dane A. Glasgow, Daniel S. Glasser, Alexander G. Gounares, James R. Larus, Matthew B. MacLaurin, Henricus Johannes Maria Meijer, Debi P. Mishra, Amit Mital, Ira L. Snyder, Chandramohan A. Thekkath, Melora Zaner-Godsey
-
Publication number: 20080082641Abstract: The claimed subject matter provides systems and/or methods that facilitate replicating a state associated with a client, user, service, application, and the like. A third party service provider can support any number of services that can be concurrently requested by several clients without user perception of degraded computing performance as compared to conventional systems/techniques due to improved connectivity and mitigated latencies. A replication component can generate replicas of states associated with requested services. Further, the replicas can facilitate seamlessly interacting with the third party service provider (e.g., while transitioning between client devices). Additionally, by providing replicas of the state related information, differing third party service providers can effectuate services based upon a request from a client without regenerating the state.Type: ApplicationFiled: December 20, 2006Publication date: April 3, 2008Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, William H. Gates, Raymond E. Ozzie, Gary W. Flake, Lili Cheng, Nishant V. Dani, Daniel S. Glasser, Alexander G. Gounares, James R. Larus, Debi P. Mishra, Amit Mital, Ira L. Snyder, Chandramohan A. Thekkath
-
Publication number: 20080082671Abstract: A system and method that facilitates and effectuates communications between disparate clients that reside in a network topology (e.g., cloud). The system and method provides a component that receives one or more prospective end points, a set of desired communication criteria/characteristics, and desired content extant on one of the clients that reside on network topology. Additionally, the system and method provides a component that establishes communications pathways to one or more prospective end points or to subsequently identified end points to facilitate transfer of desired content from the end point to a requesting client.Type: ApplicationFiled: December 20, 2006Publication date: April 3, 2008Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, Raymond E. Ozzie, Gary W. Flake, Thomas F. Bergstraesser, Arnold N. Blinn, William J. Bolosky, Christopher W. Brumme, Dane A. Glasgow, Daniel S. Glasser, Alexander G. Gounares, Matthew B. MacLaurin, Michael Maggs, Debi P. Mishra, Kartik N. Raghavan, Ira L. Snyder, Chandramohan A. Thekkath, David R. Treadwell
-
Publication number: 20070299955Abstract: A global state management service manages replication in a distributed system. A distributed system can have several replica groups. The global state management service manages state associated with each replica group. Data replication is implemented without implementing an instance of a state machine on each device in a replica group. A replica group comprises a primary device and at least one secondary device. Each device in a replica group contains a replica of data of interest. The global state management service manages the allocation of primary and secondary devices. In the absence of a failure in either a primary device or a secondary device, read and write operations are performed without consulting the global state management service. When a failure is detected, the global state management service manages failover.Type: ApplicationFiled: June 27, 2006Publication date: December 27, 2007Applicant: Microsoft CorporationInventors: William R. Hoffman, Marcus J. Jager, John P. MacCormick, Kristof Roomp, Chandramohan A. Thekkath, Lidong Zhou
-
Publication number: 20070282806Abstract: A searchable storage system indexes data, such as a blob (binary large object) as it is stored. The indexes are stored simultaneously with the data by the same storage mechanism. Data cannot be stored without indexing it. Any indexing technique may be used. The indexes are then used to access the data. This ensures that any inconsistencies can handled at the local level, and are not visible to clients of the system. Data can be put in to, or taken out from, the searchable storage system. Additionally, a query on the data in the searchable storage system may be performed.Type: ApplicationFiled: June 2, 2006Publication date: December 6, 2007Applicant: Microsoft CorporationInventors: William R. Hoffman, Marcus J. Jager, John P. MacCormick, Kristof Roomp, Chandramohan A. Thekkath