Patents by Inventor Michael Warmington

Michael Warmington has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10223364
    Abstract: A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol.
    Type: Grant
    Filed: May 6, 2016
    Date of Patent: March 5, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Pradeep Madhavarapu, Michael Warmington, Alexandru Chirica, Jun Fang, Rohan Kumar, Maciej Plaza, Srini Acharya
  • Publication number: 20160253341
    Abstract: A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol.
    Type: Application
    Filed: May 6, 2016
    Publication date: September 1, 2016
    Inventors: Pradeep Madhavarapu, Michael Warmington, Alexandru Chirica, Jun Fang, Rohan Kumar, Maciej Plaza, Srini Acharya
  • Patent number: 9336218
    Abstract: A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol.
    Type: Grant
    Filed: September 15, 2014
    Date of Patent: May 10, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Pradeep Madhavarapu, Michael Warmington, Alexandru Chirica, Jun Fang, Rohan Kumar, Maciej Plaza, Srini Acharya
  • Publication number: 20150006493
    Abstract: A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol.
    Type: Application
    Filed: September 15, 2014
    Publication date: January 1, 2015
    Inventors: Pradeep Madhavarapu, Michael Warmington, Alexandru Chirica, Jun Fang, Rohan Kumar, Maciej Plaza, Srini Acharya
  • Patent number: 8838568
    Abstract: A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol.
    Type: Grant
    Filed: August 2, 2012
    Date of Patent: September 16, 2014
    Assignee: Microsoft Corporation
    Inventors: Pradeep Madhavarapu, Michael Warmington, Alexandru Chirica, Jun Fang, Rohan Kumar, Maciej Plaza, Srini Acharya
  • Patent number: 8332432
    Abstract: A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: December 11, 2012
    Assignee: Microsoft Corporation
    Inventors: Pradeep Madhavarapu, Michael Warmington, Alexandru Chirica, Jun Fang, Rohan Kumar, Maciej Plaza, Srini Acharya
  • Publication number: 20120303667
    Abstract: A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol.
    Type: Application
    Filed: August 2, 2012
    Publication date: November 29, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Pradeep Madhavarapu, Michael Warmington, Alexandru Chirica, Jun Fang, Rohan Kumar, Maciej Plaza, Srini Acharya
  • Publication number: 20110289100
    Abstract: A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol.
    Type: Application
    Filed: May 21, 2010
    Publication date: November 24, 2011
    Applicant: Microsoft Corporation
    Inventors: Pradeep Madhavarapu, Michael Warmington, Alexandru Chirica, Jun Fang, Rohan Kumar, Maciej Plaza, Srini Acharya
  • Publication number: 20110282850
    Abstract: A database management system having a database component, which includes a lock manager, and a filesystem component. The filesystem component is configured to: generate a mapping between one or more filesystem access modes, one or more filesystem sharing modes and one or more database locks, receive a request from a filesystem stack to perform one or more actions on data in a database, identify a filesystem access mode and a filesystem share mode of the request, determine which one of the database locks corresponds to the filesystem access mode and the filesystem share mode of the request based on the mapping, and receive a notification lock on the data from the lock manager when no other database locks conflict with the notification lock, wherein the notification lock corresponds to the one of the database locks.
    Type: Application
    Filed: May 11, 2010
    Publication date: November 17, 2011
    Applicant: Microsoft Corporation
    Inventors: Vaibhav Kamra, Pradeep Madhavarapu, Cristian Diaconu, Jun Fang, Srini Acharya, Michael Warmington, Maciej Plaza, Artem Oks, Sankhyayan Debnath
  • Patent number: 7249354
    Abstract: A system and method for deploying a software build from a plurality of software builds is presented. A target computer sends a request for the software build to a build master. The build master authenticates the request, permitting only authorized requests. If the request is authorized, the build master identifies a build server that stores the requested software build. The build master generates request data that identifies the build server and authentication information, and returns the request data to the target computer. The target computer submits the request, with the request data, to the build server. The build server authenticates the request according to the request data. If the request is an authorized request, the build server returns the software build to the target computer.
    Type: Grant
    Filed: October 14, 2003
    Date of Patent: July 24, 2007
    Assignee: Microsoft Corporation
    Inventors: Jordan Tigani, Joseph Holman, Pankaj S. Lunia, David E. Gonsalves, Michael Warmington, Justin Michael Caton
  • Publication number: 20050081186
    Abstract: A system and method for deploying a software build from a plurality of software builds is presented. A target computer sends a request for the software build to a build master. The build master authenticates the request, permitting only authorized requests. If the request is authorized, the build master identifies a build server that stores the requested software build. The build master generates request data that identifies the build server and authentication information, and returns the request data to the target computer. The target computer submits the request, with the request data, to the build server. The build server authenticates the request according to the request data. If the request is an authorized request, the build server returns the software build to the target computer.
    Type: Application
    Filed: October 14, 2003
    Publication date: April 14, 2005
    Inventors: Jordan Tigani, Joseph Holman, Pankaj Lunia, David Gonsalves, Michael Warmington, Justin Caton