Patents by Inventor Mahesh K. Sreenivas
Mahesh K. Sreenivas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140195489Abstract: Architecture that addresses an end-to-end solution for logical transactional replication from a shared-nothing clustered database management system, which uses adaptive cloning for high availability. This can be time based using a global logical timestamp. The disclosed architecture, used for refreshing stale clones, does not preserve user transaction boundaries, which is a more complex situation than where the boundaries are preserved. In such a scenario it is probable that for a given data segment no clone of the segment may contain the complete user transaction history, and hence, the history has to be pieced together from the logs of multiple different clones. This is accomplished such that log harvesting is coordinated with the clone state transitions to ensure the correctness of logical replication.Type: ApplicationFiled: January 21, 2014Publication date: July 10, 2014Applicant: MICROSOFT CORPORATIONInventors: Rui Wang, Michael E. Habben, Qun Guo, Peter Byrne, Robin D. Dhamankar, Vishal Kathuria, Mahesh K. Sreenivas, Yixue Zhu, Xiaowei Jiang
-
Patent number: 8671074Abstract: Architecture that addresses an end-to-end solution for logical transactional replication from a shared-nothing clustered database management system, which uses adaptive cloning for high availability. This can be time based using a global logical timestamp. The disclosed architecture, used for refreshing stale clones, does not preserve user transaction boundaries, which is a more complex situation than where the boundaries are preserved. In such a scenario it is probable that for a given data segment no clone of the segment may contain the complete user transaction history, and hence, the history has to be pieced together from the logs of multiple different clones. This is accomplished such that log harvesting is coordinated with the clone state transitions to ensure the correctness of logical replication.Type: GrantFiled: April 12, 2010Date of Patent: March 11, 2014Assignee: Microsoft CorporationInventors: Rui Wang, Michael E. Habben, Qun Guo, Peter Byrne, Robin D. Dhamankar, Vishal Kathuria, Mahesh K. Sreenivas, Yixue Zhu, Xiaowei Jiang
-
Patent number: 8156507Abstract: An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components (SIAC) and one or more set-based access components (SBAC). An interface component is employed by the agent component to process kernel mode requests from a user mode application when communicating with a storage platform. Re-try components can be provided to facilitate cooperation between the SIAC and the SBAC.Type: GrantFiled: December 8, 2006Date of Patent: April 10, 2012Assignee: Microsoft CorporationInventors: Arkadi Brjazovski, Rohan Kumar, Cristian Diaconu, Oleksandr Gololobov, Mahesh K. Sreenivas
-
Publication number: 20110251997Abstract: Architecture that addresses an end-to-end solution for logical transactional replication from a shared-nothing clustered database management system, which uses adaptive cloning for high availability. This can be time based using a global logical timestamp. The disclosed architecture, used for refreshing stale clones, does not preserve user transaction boundaries, which is a more complex situation than where the boundaries are preserved. In such a scenario it is probable that for a given data segment no clone of the segment may contain the complete user transaction history, and hence, the history has to be pieced together from the logs of multiple different clones. This is accomplished such that log harvesting is coordinated with the clone state transitions to ensure the correctness of logical replication.Type: ApplicationFiled: April 12, 2010Publication date: October 13, 2011Applicant: Microsoft CorporationInventors: Rui Wang, Michael E. Habben, Qun Guo, Peter Byrne, Robin D. Dhamankar, Vishal Kathuria, Mahesh K. Sreenivas, Yixue Zhu, Xiaowei Jiang
-
Patent number: 7970747Abstract: An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access between the single-item access components and the set-based access components.Type: GrantFiled: April 30, 2010Date of Patent: June 28, 2011Assignee: Microsoft CorporationInventors: Arkadi Brjazovski, Rohan Kumar, Sameet H. Agarwal, Stefan R. Steiner, Mahesh K. Sreenivas
-
Patent number: 7925681Abstract: A file namespace hierarchy bypass and method to access files are provided. The bypass can be employed, for example, as a computer-readable medium with instructions for generating a unique identifier associated with a file and instructions for accessing the file based on the unique identifier and a specified search space. A computer-readable medium having instructions for obtaining the unique identifier and specified search space associated with the file and instructions for generating a path designation by combining the unique identifier and the specified search space used to access the file may also be employed. The method for bypassing the namespace hierarchy of the file, for example, may include passing the unique identifier and specified search space to a program and accessing the file based on a path designation generated by the program by combining the unique identifier and specified search space.Type: GrantFiled: April 28, 2006Date of Patent: April 12, 2011Assignee: Microsoft CorporationInventors: Mahesh K. Sreenivas, Stefan R. Steiner, Arkadi Brjazovski, Sameet H. Agarwal
-
Publication number: 20100223443Abstract: An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access between the single-item access components and the set-based access components.Type: ApplicationFiled: April 30, 2010Publication date: September 2, 2010Applicant: Microsoft CorporationInventors: Arkadi Brjazovski, Rohan Kumar, Sameet H. Agarwal, Stefan R. Steiner, Mahesh K. Sreenivas
-
Patent number: 7747634Abstract: When rich data is tunneled, its associated link identified by a primary data reference is changed by swapping primary references of original data with changed data. Thus, without duplicating the rich data, it is now associated with the changed data, preserving it in constant time. The primary references can include, but are not limited to, names and/or other item identifications. This technique allows preservation of rich data to occur without burdening processing and/or time constraints based on the size and/or number of rich data elements. The technique also allows disparate applications and/or systems to maintain data integrity even when rich data is not expected for a given application and/or system. Since the rich data follows a primary reference, awareness of the rich data is not required for it to be properly handled, ensuring its integrity.Type: GrantFiled: March 8, 2007Date of Patent: June 29, 2010Assignee: Microsoft CorporationInventors: Mahesh K. Sreenivas, Benjamin Leon Grol-Prokopczyk, Jack S. Richins
-
Patent number: 7716247Abstract: An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access conflicts between the single-item access components and the set-based access components.Type: GrantFiled: December 18, 2006Date of Patent: May 11, 2010Assignee: Microsoft CorporationInventors: Arkadi Brjazovski, Rohan Kumar, Sameet H. Agarwal, Stefan R. Steiner, Mahesh K. Sreenivas
-
Publication number: 20100082546Abstract: A technique is described for storing data from a database across a plurality of data storage devices, wherein each data storage device is capable of being accessed only by a corresponding computer system in a group of interconnected computer systems. In accordance with the technique, an identifier of the database is received. An identifier of a storage tier instance is also received, wherein the storage tier instance comprises a logical representation of one or more storage locations within each of the data storage devices. Responsive to the receipt of the identifier of the database and the identifier of the storage tier instance, data from the database is stored in two or more of the storage locations logically represented by the storage tier instance, wherein each of the two or more storage locations in which data is stored is within a corresponding one of the data storage devices.Type: ApplicationFiled: September 30, 2008Publication date: April 1, 2010Applicant: Microsoft CorporationInventors: Mahesh K. Sreenivas, Robert H. Gerber, Vishal Kathuria, John F. Ludeman, Ashwin Shrinivas, Michael A. Uhlar
-
Publication number: 20100082551Abstract: A method of updating a clone data map associated with a plurality of nodes of a computer system is disclosed. The clone data map includes node identification data and clone location data. A node failure event of a failed node of the computer system that supports a primary clone is detected. The clone data map is updated such that a secondary clone stored at a node other than the failed node is marked as a new primary clone. In addition, clone data maps may be used to perform node load balancing by placing a substantially similar number of primary clones on each node of a node cluster or may be used to increase or decrease a number of nodes of the node cluster. Further, data fragments that have a heavy usage or a large fragment size may be reduced in size by performing one or more data fragment split operations.Type: ApplicationFiled: September 26, 2008Publication date: April 1, 2010Applicant: MICROSOFT CORPORATIONInventors: Vishal Kathuria, Robert H. Gerber, Mahesh K. Sreenivas, Yixue Zhu, John Ludeman, Ashwin Shrinivas, Ming Chuan Wu
-
Patent number: 7478116Abstract: A file stream exchange system and method are provided. The system can be employed, for example, with a storage system that supports transactions as a primary mechanism and employs a rich type system. The system provides a mechanism for the storage system to provide reliable updates to file streams while preserving the common criteria for security. The system includes a replace stream component which is a kernel mode mechanism that allows transactional exchange of stream data of two file-backed items without violating the common criteria for security.Type: GrantFiled: February 17, 2006Date of Patent: January 13, 2009Assignee: Microsoft CorporationInventors: Mahesh K. Sreenivas, Arkadi Brjazovski, Stefan R. Steiner, Rohan Kumar, Sameet H. Agarwal
-
Publication number: 20080222200Abstract: When rich data is tunneled, its associated link identified by a primary data reference is changed by swapping primary references of original data with changed data. Thus, without duplicating the rich data, it is now associated with the changed data, preserving it in constant time. The primary references can include, but are not limited to, names and/or other item identifications. This technique allows preservation of rich data to occur without burdening processing and/or time constraints based on the size and/or number of rich data elements. The technique also allows disparate applications and/or systems to maintain data integrity even when rich data is not expected for a given application and/or system. Since the rich data follows a primary reference, awareness of the rich data is not required for it to be properly handled, ensuring its integrity.Type: ApplicationFiled: March 8, 2007Publication date: September 11, 2008Applicant: MICROSOFT CORPORATIONInventors: Mahesh K. Sreenivas, Benjamin Leon Grol-Prokopczyk, Jack S. Richins
-
Publication number: 20080147665Abstract: An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access conflicts between the single-item access components and the set-based access components.Type: ApplicationFiled: December 18, 2006Publication date: June 19, 2008Applicant: MICROSOFT CORPORATIONInventors: Arkadi Brjazovski, Rohan Kumar, Sameet H. Agarwal, Stefan R. Steiner, Mahesh K. Sreenivas
-
Publication number: 20080141260Abstract: An operating system is provided. The system includes an agent components (SIAC) and one or more set-based access components (SBAC). An interface component is employed by the agent component to process kernel mode requests from a user mode application when communicating with a storage platform. Re-try components can be provided to facilitate cooperation between the SIAC and the SBAC.Type: ApplicationFiled: December 8, 2006Publication date: June 12, 2008Applicant: MICROSOFT CORPORATIONInventors: Arkadi Brjazovski, Rohan Kumar, Cristian Diaconu, Oleksandr Gololobov, Mahesh K. Sreenivas