Patents by Inventor Rajagopalan Narayanan
Rajagopalan Narayanan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150381465Abstract: Using real world network traffic for both a primary and ancillary system. A method includes accessing intercepted network traffic directed to a primary system. The intercepted network traffic is real network traffic sent by entities sending messages directed to the primary system. One or more policy constraints are identified on network traffic to be used at an ancillary system. Based on the one or more policy constraints, a subset of the intercepted network traffic is identified. The subset of the intercepted traffic is sent to the ancillary system, where the subset of the intercepted traffic is consumed by the ancillary system.Type: ApplicationFiled: June 26, 2014Publication date: December 31, 2015Inventors: Rajagopalan Narayanan, Chetan Pentam Raghavendra
-
Publication number: 20080059214Abstract: In accordance with certain aspects of the model-based policy application, each of a plurality of policies is associated with appropriate parts of a model of a heterogeneous system. A deployment agent is invoked to apply each of the plurality of policies to components associated with the parts of the model. An identification of a change to one of the plurality of policies is received, and the deployment agent is also invoked to apply the changed policy to selected ones of the components associated with the parts of the model.Type: ApplicationFiled: January 12, 2007Publication date: March 6, 2008Applicant: Microsoft CorporationInventors: Anders Vinberg, Bruce Copeland, Robert Fries, Kevin Grealish, Jonathan Hardwick, Michael Healy, Galen Hunt, Aamer Hydrie, David James, Anand Lakshminarayanan, Edwin Lassettre, Raymond McCollum, Rob Mensching, Mazhar Mohammed, Rajagopalan Narayanan, Geoffrey Outhred, Zhengkai Pan, Efstathios Papaefstathiou, John Parchem, Vij Rajarajan, Ashvikumar Sanghvi, Bassam Tabbara, Rene Vega, Vitaly Voloshin, Robert Welland, John Wilson, Eric Winner, Jeffrey Woolsey
-
Publication number: 20070192453Abstract: A method, system, and architecture for managing computer systems is provided. A management system employs management objects (MOs) to provide administrators the ability to intuitively express the administrative intent in an information technology (IT) environment, and to act out the administrative intent based on the information gathered by the management system. Managed elements of an IT environment, such as, by way of example, hardware components, software applications, software updates, software distribution policies, configurations, settings, etc., may be expressed as MOs. Actions, such as, by way of example, detect, install/apply, remove, remediate, enumerate, etc., may be associated with the MOs. The management system manages the computer systems by deploying the appropriate MOs and their associated actions onto the computer systems, and performing the actions on the computer systems.Type: ApplicationFiled: February 16, 2006Publication date: August 16, 2007Applicant: Microsoft CorporationInventors: Bruce Copeland, David James, Donald Song, Dustin Ingalls, Jeffrey Sutherland, Jeffry Phillips, Joseph Calabig, Khuzaima Iqbal, Michael Healy, Rajagopalan Narayanan, Zhengkai Pan
-
Publication number: 20070162541Abstract: A client in a plurality of clients with a same network address or similar common identifier is designated a Peer Distribution Point (PDP) agent for distributing a software application divided into several packages to the plurality of clients. The plurality of clients are part of a client-server hierarchical system comprising a Central SMS site server and several Distributing servers. The Central SMS site server generates policies for the packages that are pushed to a Distribution server assigned to the plurality of clients from where the PDP agent pulls the policies. The Central SMS site server generates the packages that are pushed to the Distributing server after the PDP agent pulls the policies. The packages are pulled by the PDP agent from the Distributing server. The other clients pull the packages from the PDP agent as and when needed.Type: ApplicationFiled: January 6, 2006Publication date: July 12, 2007Applicant: Microsoft CorporationInventors: Gaurav Dhawan, David James, Nirupama Chandrasekaran, Rajagopalan Narayanan, Ingo Bringemeier, John Ellis, Michael Healy, Khuzaima Iqbal
-
Publication number: 20070150737Abstract: Techniques for registering certificates after the issuance of the certificates are provided. A service provider securely registers a client's identity and its certificate without depending on or using an existing basis of trust, such as that provided by domain-joined clients or a security directory (e.g., MICROSOFT's ACTIVE DIRECTORY). The service provider provides services, such as, by way of example and not a limitation, email services, web application services, application services, etc., based on identifiers (e.g., service IDs) issued to registered clients. The service provider subsequently uses the issued identifier to authenticate a client requesting a service or services, and to authorize the client to receive the requested service or services.Type: ApplicationFiled: December 22, 2005Publication date: June 28, 2007Applicant: Microsoft CorporationInventors: Gopal Parupudi, Prabhu Padhi, Rajagopalan Narayanan, Ram Sunkara, Sean Cannella, Tak Lung, John Ellis
-
Publication number: 20070005320Abstract: Model-based configuration management and modeling identifies violations of configuration constraints. A system includes multiple components and multiple applications defined by a model of the system. A process identifies configuration settings associated with the components and configuration settings associated with the applications. A configuration policy is created for the system based on information contained in the model of the system and the configuration settings.Type: ApplicationFiled: June 29, 2005Publication date: January 4, 2007Applicant: Microsoft CorporationInventors: Anders Vinberg, Anand Lakshminarayanan, Ashvinkumar Sanghvi, Vij Rajarajan, Vitaly Voloshin, Bassam Tabbara, Kevin Grealish, Rob Mensching, Geoffrey Outhred, Galen Hunt, Aamer Hydrie, Robert Welland, Rajagopalan Narayanan, Bruce Copeland, Ken Pan, David James, Michael Healy
-
Publication number: 20060025985Abstract: A model of a system is generated and used as a basis for managing the system. As the system is managed, the system model can be updated to reflect changes to the system. Managing of the system can include one or more of provisioning applications in the system, provisioning applications in virtual systems, provisioning test environments, monitoring the configuration of the system, monitoring the system including the health of the system, performing capacity planning for the system, and propagating attributes to different components in the system.Type: ApplicationFiled: June 29, 2005Publication date: February 2, 2006Applicant: Microsoft CorporationInventors: Anders Vinberg, Bruce Copeland, Robert Fries, Kevin Grealish, Jonathan Hardwick, Michael Healy, Galen Hunt, Aamer Hydrie, David James, Anand Lakshminarayanan, Rob Mensching, Rajagopalan Narayanan, Geoffrey Outhred, Ken Pan, Efstathios Papaefstathion, John Parchem, Vij Rajarajan, Ashvinkumar Sanghvi, Bassam Tabbara, Rene Vega, Vitaly Voloshin, Robert Welland, Eric Winner, Jeffrey Woolsey