Patents by Inventor Mahesh K. Sreenivas

Mahesh K. Sreenivas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140195489
    Abstract: Architecture that addresses an end-to-end solution for logical transactional replication from a shared-nothing clustered database management system, which uses adaptive cloning for high availability. This can be time based using a global logical timestamp. The disclosed architecture, used for refreshing stale clones, does not preserve user transaction boundaries, which is a more complex situation than where the boundaries are preserved. In such a scenario it is probable that for a given data segment no clone of the segment may contain the complete user transaction history, and hence, the history has to be pieced together from the logs of multiple different clones. This is accomplished such that log harvesting is coordinated with the clone state transitions to ensure the correctness of logical replication.
    Type: Application
    Filed: January 21, 2014
    Publication date: July 10, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Rui Wang, Michael E. Habben, Qun Guo, Peter Byrne, Robin D. Dhamankar, Vishal Kathuria, Mahesh K. Sreenivas, Yixue Zhu, Xiaowei Jiang
  • Patent number: 8671074
    Abstract: Architecture that addresses an end-to-end solution for logical transactional replication from a shared-nothing clustered database management system, which uses adaptive cloning for high availability. This can be time based using a global logical timestamp. The disclosed architecture, used for refreshing stale clones, does not preserve user transaction boundaries, which is a more complex situation than where the boundaries are preserved. In such a scenario it is probable that for a given data segment no clone of the segment may contain the complete user transaction history, and hence, the history has to be pieced together from the logs of multiple different clones. This is accomplished such that log harvesting is coordinated with the clone state transitions to ensure the correctness of logical replication.
    Type: Grant
    Filed: April 12, 2010
    Date of Patent: March 11, 2014
    Assignee: Microsoft Corporation
    Inventors: Rui Wang, Michael E. Habben, Qun Guo, Peter Byrne, Robin D. Dhamankar, Vishal Kathuria, Mahesh K. Sreenivas, Yixue Zhu, Xiaowei Jiang
  • Patent number: 8156507
    Abstract: An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components (SIAC) and one or more set-based access components (SBAC). An interface component is employed by the agent component to process kernel mode requests from a user mode application when communicating with a storage platform. Re-try components can be provided to facilitate cooperation between the SIAC and the SBAC.
    Type: Grant
    Filed: December 8, 2006
    Date of Patent: April 10, 2012
    Assignee: Microsoft Corporation
    Inventors: Arkadi Brjazovski, Rohan Kumar, Cristian Diaconu, Oleksandr Gololobov, Mahesh K. Sreenivas
  • Publication number: 20110251997
    Abstract: Architecture that addresses an end-to-end solution for logical transactional replication from a shared-nothing clustered database management system, which uses adaptive cloning for high availability. This can be time based using a global logical timestamp. The disclosed architecture, used for refreshing stale clones, does not preserve user transaction boundaries, which is a more complex situation than where the boundaries are preserved. In such a scenario it is probable that for a given data segment no clone of the segment may contain the complete user transaction history, and hence, the history has to be pieced together from the logs of multiple different clones. This is accomplished such that log harvesting is coordinated with the clone state transitions to ensure the correctness of logical replication.
    Type: Application
    Filed: April 12, 2010
    Publication date: October 13, 2011
    Applicant: Microsoft Corporation
    Inventors: Rui Wang, Michael E. Habben, Qun Guo, Peter Byrne, Robin D. Dhamankar, Vishal Kathuria, Mahesh K. Sreenivas, Yixue Zhu, Xiaowei Jiang
  • Patent number: 7970747
    Abstract: An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access between the single-item access components and the set-based access components.
    Type: Grant
    Filed: April 30, 2010
    Date of Patent: June 28, 2011
    Assignee: Microsoft Corporation
    Inventors: Arkadi Brjazovski, Rohan Kumar, Sameet H. Agarwal, Stefan R. Steiner, Mahesh K. Sreenivas
  • Patent number: 7925681
    Abstract: A file namespace hierarchy bypass and method to access files are provided. The bypass can be employed, for example, as a computer-readable medium with instructions for generating a unique identifier associated with a file and instructions for accessing the file based on the unique identifier and a specified search space. A computer-readable medium having instructions for obtaining the unique identifier and specified search space associated with the file and instructions for generating a path designation by combining the unique identifier and the specified search space used to access the file may also be employed. The method for bypassing the namespace hierarchy of the file, for example, may include passing the unique identifier and specified search space to a program and accessing the file based on a path designation generated by the program by combining the unique identifier and specified search space.
    Type: Grant
    Filed: April 28, 2006
    Date of Patent: April 12, 2011
    Assignee: Microsoft Corporation
    Inventors: Mahesh K. Sreenivas, Stefan R. Steiner, Arkadi Brjazovski, Sameet H. Agarwal
  • Publication number: 20100223443
    Abstract: An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access between the single-item access components and the set-based access components.
    Type: Application
    Filed: April 30, 2010
    Publication date: September 2, 2010
    Applicant: Microsoft Corporation
    Inventors: Arkadi Brjazovski, Rohan Kumar, Sameet H. Agarwal, Stefan R. Steiner, Mahesh K. Sreenivas
  • Patent number: 7747634
    Abstract: When rich data is tunneled, its associated link identified by a primary data reference is changed by swapping primary references of original data with changed data. Thus, without duplicating the rich data, it is now associated with the changed data, preserving it in constant time. The primary references can include, but are not limited to, names and/or other item identifications. This technique allows preservation of rich data to occur without burdening processing and/or time constraints based on the size and/or number of rich data elements. The technique also allows disparate applications and/or systems to maintain data integrity even when rich data is not expected for a given application and/or system. Since the rich data follows a primary reference, awareness of the rich data is not required for it to be properly handled, ensuring its integrity.
    Type: Grant
    Filed: March 8, 2007
    Date of Patent: June 29, 2010
    Assignee: Microsoft Corporation
    Inventors: Mahesh K. Sreenivas, Benjamin Leon Grol-Prokopczyk, Jack S. Richins
  • Patent number: 7716247
    Abstract: An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access conflicts between the single-item access components and the set-based access components.
    Type: Grant
    Filed: December 18, 2006
    Date of Patent: May 11, 2010
    Assignee: Microsoft Corporation
    Inventors: Arkadi Brjazovski, Rohan Kumar, Sameet H. Agarwal, Stefan R. Steiner, Mahesh K. Sreenivas
  • Publication number: 20100082546
    Abstract: A technique is described for storing data from a database across a plurality of data storage devices, wherein each data storage device is capable of being accessed only by a corresponding computer system in a group of interconnected computer systems. In accordance with the technique, an identifier of the database is received. An identifier of a storage tier instance is also received, wherein the storage tier instance comprises a logical representation of one or more storage locations within each of the data storage devices. Responsive to the receipt of the identifier of the database and the identifier of the storage tier instance, data from the database is stored in two or more of the storage locations logically represented by the storage tier instance, wherein each of the two or more storage locations in which data is stored is within a corresponding one of the data storage devices.
    Type: Application
    Filed: September 30, 2008
    Publication date: April 1, 2010
    Applicant: Microsoft Corporation
    Inventors: Mahesh K. Sreenivas, Robert H. Gerber, Vishal Kathuria, John F. Ludeman, Ashwin Shrinivas, Michael A. Uhlar
  • Publication number: 20100082551
    Abstract: A method of updating a clone data map associated with a plurality of nodes of a computer system is disclosed. The clone data map includes node identification data and clone location data. A node failure event of a failed node of the computer system that supports a primary clone is detected. The clone data map is updated such that a secondary clone stored at a node other than the failed node is marked as a new primary clone. In addition, clone data maps may be used to perform node load balancing by placing a substantially similar number of primary clones on each node of a node cluster or may be used to increase or decrease a number of nodes of the node cluster. Further, data fragments that have a heavy usage or a large fragment size may be reduced in size by performing one or more data fragment split operations.
    Type: Application
    Filed: September 26, 2008
    Publication date: April 1, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Vishal Kathuria, Robert H. Gerber, Mahesh K. Sreenivas, Yixue Zhu, John Ludeman, Ashwin Shrinivas, Ming Chuan Wu
  • Patent number: 7478116
    Abstract: A file stream exchange system and method are provided. The system can be employed, for example, with a storage system that supports transactions as a primary mechanism and employs a rich type system. The system provides a mechanism for the storage system to provide reliable updates to file streams while preserving the common criteria for security. The system includes a replace stream component which is a kernel mode mechanism that allows transactional exchange of stream data of two file-backed items without violating the common criteria for security.
    Type: Grant
    Filed: February 17, 2006
    Date of Patent: January 13, 2009
    Assignee: Microsoft Corporation
    Inventors: Mahesh K. Sreenivas, Arkadi Brjazovski, Stefan R. Steiner, Rohan Kumar, Sameet H. Agarwal
  • Publication number: 20080222200
    Abstract: When rich data is tunneled, its associated link identified by a primary data reference is changed by swapping primary references of original data with changed data. Thus, without duplicating the rich data, it is now associated with the changed data, preserving it in constant time. The primary references can include, but are not limited to, names and/or other item identifications. This technique allows preservation of rich data to occur without burdening processing and/or time constraints based on the size and/or number of rich data elements. The technique also allows disparate applications and/or systems to maintain data integrity even when rich data is not expected for a given application and/or system. Since the rich data follows a primary reference, awareness of the rich data is not required for it to be properly handled, ensuring its integrity.
    Type: Application
    Filed: March 8, 2007
    Publication date: September 11, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Mahesh K. Sreenivas, Benjamin Leon Grol-Prokopczyk, Jack S. Richins
  • Publication number: 20080147665
    Abstract: An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access conflicts between the single-item access components and the set-based access components.
    Type: Application
    Filed: December 18, 2006
    Publication date: June 19, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Arkadi Brjazovski, Rohan Kumar, Sameet H. Agarwal, Stefan R. Steiner, Mahesh K. Sreenivas
  • Publication number: 20080141260
    Abstract: An operating system is provided. The system includes an agent components (SIAC) and one or more set-based access components (SBAC). An interface component is employed by the agent component to process kernel mode requests from a user mode application when communicating with a storage platform. Re-try components can be provided to facilitate cooperation between the SIAC and the SBAC.
    Type: Application
    Filed: December 8, 2006
    Publication date: June 12, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Arkadi Brjazovski, Rohan Kumar, Cristian Diaconu, Oleksandr Gololobov, Mahesh K. Sreenivas