Patents by Inventor Felix Xavier
Felix Xavier has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12094174Abstract: Data processing systems are disclosed for determining semantic and person keypoints for an environment and an image and matching the keypoints for the image to the keypoints for the environment. A homography is generated based on the keypoint matching and decomposed into a matrix. Camera parameters are then determined from the matrix. A plurality of random camera poses can be generated and used to project keypoints for an environment using image keypoints. The projected keypoints can be compared to the actual keypoints for the environment to determine an error and weighting for each of the random camera poses.Type: GrantFiled: May 22, 2023Date of Patent: September 17, 2024Assignee: Genius Sports SS, LLCInventors: Leonardo Citraro, Pablo Márquez Neila, Stefano Savarè, Vivek Jayaram, Charles Xavier Quentin Dubout, Felix Constant Marc Renaut, Andres Michael Levering Hasfura, Horesh Beny Ben Shitrit, Pascal Fua
-
Publication number: 20240247015Abstract: The present invention covers phosphorus derivatives of general formula (I), in which R1, R2, R3, R4, R5, R6, X1, X2, X3, X4 and Y are as defined herein, methods of preparing said compounds, intermediate compounds useful for preparing said compounds, pharmaceutical compositions and combinations comprising said compounds and the use of said compounds for manufacturing pharmaceutical compositions for the treatment or prophylaxis of diseases, in particular of hyperproliferative disorders, especially diseases associated with SOS1, as a sole agent or in combination with other active ingredients.Type: ApplicationFiled: April 13, 2022Publication date: July 25, 2024Inventors: Felix PAPE, Steffen GRESSIES, Timo STELLFELD, Jeremie Xavier G MORTIER, Atanas Marinov KAMBUROV, Benjamin BADER, Keith GRAHAM, Roman HILLIG, Jens SCHRODER, Christoph Philipp HETHEY, Matthias ARLT, Gerhard SIEMEISTER, Katrin NOWAK-REPPEL, Michael ERKELENZ
-
Patent number: 9270459Abstract: Techniques for achieving tenant data confidentiality in a cloud environment are presented. A daemon process within a Tenant Storage Machine (TSM) manages a key store for a particular tenant of a cloud storage environment having multiple other tenants. Just TSM storage processes are given access to the key store. Data is decrypted for the particular tenant when access is needed and data is encrypted using encryption keys of the key store when written in the cloud storage environment.Type: GrantFiled: September 12, 2012Date of Patent: February 23, 2016Assignee: CloudByte, Inc.Inventors: Umasankar Mukkara, Felix Xavier, Shyamsundar Ranganathan
-
Patent number: 9218264Abstract: Techniques for translating Service Level Agreement (SLA) policy into storage controller requirements within a cloud storage environment are presented. System resource metrics for a storage controller are derived. The SLA policy is defined in terms of SLA parameters. Heuristics are used to translate the SLA parameters into defined percentages of system resources for the storage controller, which are compared to the system resource metrics and adjustments are updates are made as needed.Type: GrantFiled: September 18, 2012Date of Patent: December 22, 2015Assignee: CloudByte, Inc.Inventors: Felix Xavier, Umasankar Mukkara, Shyamsundar Ranganathan
-
Patent number: 9141785Abstract: Techniques for tenant-bases storage security and service level assurances in a cloud environment are presented. A Tenant Storage Machine (TSM) for each tenant uses a unique identifier. The TSM is dynamically allocated with operating system resources to run processes based on agreed service level assurances. The service level assurances are stored in a Service Level Assurance (SLA) policy store. The TSM communicates with the SLA policy store via a TSM bus to acquire a SLA policy configured for the tenant and based on which resources are dynamically allocated. Processes running under the TSM run with root privileges to provide security.Type: GrantFiled: July 26, 2012Date of Patent: September 22, 2015Assignee: CloudByte, Inc.Inventors: Umasankar Mukkara, Felix Xavier, Srivibhavan Balaram, Shailesh Bam
-
Patent number: 8930547Abstract: Techniques for achieving storage and network isolation in a cloud environment are presented. A single Internet Protocol (IP) address is presented to multiple storage tenants that use storage in a cloud environment. When each tenant accesses the IP address, a specific identity of the tenant is resolved and the storage stack for that tenant is sent to the tenant's storage machine having the tenant's storage. The tenant is directly connected to its tenant storage machine thereafter.Type: GrantFiled: August 29, 2012Date of Patent: January 6, 2015Assignee: CloudByte, Inc.Inventors: Umasankar Mukkara, Felix Xavier
-
Patent number: 8862928Abstract: Techniques for achieving high availability (HA) in a cloud environment are presented. Cloud storage provided to multiple tenants is accessed via a plurality of controllers via a switch. The controllers are organized in a ring and each controller is responsible for detecting failures in adjoining controllers within the ring. Storage services for the tenants are serviced without disruptions even when multiple nodes completely fail at the same time.Type: GrantFiled: September 7, 2012Date of Patent: October 14, 2014Assignee: CloudByte, Inc.Inventors: Felix Xavier, Umasankar Mukkara, Vishnu Govind Attur
-
Patent number: 8620874Abstract: A source application reads a body of data in data block sized units and calculates a checksum value for each data block before sending the data block, the calculated checksum value and the identifier. Upon receipt, a destination application independently calculates a checksum value for each received data block and compares the two checksums. Non-matching checksums indicate a network-induced error in the data block. Identifiers for the erroneous data blocks are transmitted to the source application after all of the data blocks have been initially transmitted. The source application thereafter resends only those data blocks identified. The destination application repeats the process of comparing checksums and transmitting identifiers to the source application until all of the data blocks of the body of data have been correctly received, and then uses the data blocks to recreate the body of data.Type: GrantFiled: June 20, 2011Date of Patent: December 31, 2013Assignee: NetApp, Inc.Inventors: Felix Xavier, Kevin Varghese, Tijin George, Jayalakshmi Pattabiraman
-
Publication number: 20130073708Abstract: Techniques for achieving parallel scalability, storage capacity, and improved storage performance in a multi-tenant storage cloud environment are presented. A Tenant Storage Machine (TSM) of a tenant for the multi-tenant storage cloud environment is portable and can be dynamically detached from one or more storage controllers and dynamically moved to provide scalability, capacity, and improved storage performance.Type: ApplicationFiled: September 18, 2012Publication date: March 21, 2013Applicant: CLOUDBYTE, INC.Inventors: Felix Xavier, Umasankar Mukkara, Ratna Kiran Mova
-
Publication number: 20130074091Abstract: Techniques for ensuring performance metrics are met by resources in a multi-tenant storage controller are presented. Each resource of the multi-tenant storage controller is tracked on a per tenant bases. Usage limits are enforced on per resource and per tenant bases for the multi-tenant storage controller.Type: ApplicationFiled: September 18, 2012Publication date: March 21, 2013Applicant: CLOUDBYTE, INC.Inventors: Felix Xavier, Umasankar Mukkara
-
Publication number: 20130073667Abstract: Techniques for managing and monitoring multi-tenant storage in a cloud environment are presented. Storage resources are monitored on a per tenant bases and as a whole for the cloud environment. New and existing administrative types can be dynamically created and managed within the cloud environment.Type: ApplicationFiled: September 14, 2012Publication date: March 21, 2013Applicant: CLOUDBYTE, INC.Inventors: Umasankar Mukkara, Felix Xavier, Ratna Kiran Mova
-
Publication number: 20130073806Abstract: Techniques for translating Service Level Agreement (SLA) policy into storage controller requirements within a cloud storage environment are presented. System resource metrics for a storage controller are derived. The SLA policy is defined in terms of SLA parameters. Heuristics are used to translate the SLA parameters into defined percentages of system resources for the storage controller, which are compared to the system resource metrics and adjustments are updates are made as needed.Type: ApplicationFiled: September 18, 2012Publication date: March 21, 2013Applicant: CLOUDBYTE, INC.Inventors: Felix Xavier, Umasankar Mukkara, Shyamsundar Ranganathan
-
Publication number: 20130073894Abstract: Techniques for achieving high availability (HA) in a cloud environment are presented. Cloud storage provided to multiple tenants is accessed via a plurality of controllers via a switch. The controllers are organized in a ring and each controller is responsible for detecting failures in adjoining controllers within the ring. Storage services for the tenants are serviced without disruptions even when multiple nodes completely fail at the same time.Type: ApplicationFiled: September 7, 2012Publication date: March 21, 2013Applicant: CloudByte, Inc.Inventors: Felix Xavier, Umasankar Mukkara, Vishnu Govind Attur
-
Publication number: 20130067540Abstract: Techniques for achieving storage and network isolation in a cloud environment are presented. A single Internet Protocol (IP) address is presented to multiple storage tenants that use storage in a cloud environment. When each tenant accesses the IP address, a specific identity of the tenant is resolved and the storage stack for that tenant is sent to the tenant's storage machine having the tenant's storage. The tenant is directly connected to its tenant storage machine thereafter.Type: ApplicationFiled: August 29, 2012Publication date: March 14, 2013Applicant: CloudByte, Inc.Inventors: Umasankar Mukkara, Felix Xavier
-
Publication number: 20130036449Abstract: Techniques for tenant-bases storage security and service level assurances in a cloud environment are presented. A Tenant Storage Machine (TSM) for each tenant uses a unique identifier. The TSM is dynamically allocated with operating system resources to run processes based on agreed service level assurances. The service level assurances are stored in a Service Level Assurance (SLA) policy store. The TSM communicates with the SLA policy store via a TSM bus to acquire a SLA policy configured for the tenant and based on which resources are dynamically allocated. Processes running under the TSM run with root privileges to provide security.Type: ApplicationFiled: July 26, 2012Publication date: February 7, 2013Applicant: CLOUDBYTE, INC.Inventors: Umasankar Mukkara, Felix Xavier, Srivibhavan Balaram, Shailesh Bam
-
Publication number: 20120328105Abstract: Techniques for achieving tenant data confidentiality in a cloud environment are presented. A daemon process within a Tenant Storage Machine (TSM) manages a key store for a particular tenant of a cloud storage environment having multiple other tenants. Just TSM storage processes are given access to the key store. Data is decrypted for the particular tenant when access is needed and data is encrypted using encryption keys of the key store when written in the cloud storage environment.Type: ApplicationFiled: September 12, 2012Publication date: December 27, 2012Applicant: CloudByte,Inc.Inventors: Umasankar Mukkara, Felix Xavier, Shyamsundar Ranganathan
-
Patent number: 7991750Abstract: A source application reads a body of data in data block sized units and calculates a checksum value for each data block before sending the data block, the calculated checksum value and the identifier. Upon receipt, a destination application independently calculates a checksum value for each received data block and compares the two checksums. Non-matching checksums indicate a network-induced error in the data block. Identifiers for the erroneous data blocks are transmitted to the source application after all of the data blocks have been initially transmitted. The source application thereafter resends only those data blocks identified. The destination application repeats the process of comparing checksums and transmitting identifiers to the source application until all of the data blocks of the body of data have been correctly received, and then uses the data blocks to recreate the body of data.Type: GrantFiled: June 10, 2008Date of Patent: August 2, 2011Assignee: Network Appliance, Inc.Inventors: Felix Xavier, Kevin Varghese, Tijin George, Jayalakshmi Pattabiraman