Patents by Inventor Roopesh Kumar

Roopesh Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10168937
    Abstract: Example implementations relate to storage space allocation. For example, an implementation includes an apparatus including a controller. The controller is to receive an allocation request from a host computing device. The controller is also to reserve a portion of storage space in the storage device via a reservation table based on the allocation request. The controller is further to determine a type of the allocation request. The type of the allocation request includes a space-optimized allocation request and a non-space-optimized allocation request. When the type of the allocation request corresponds to the non-space-optimized allocation request, the controller is to commit the portion of storage space via an allocation table. When the type of the allocation request corresponds to the space-optimized allocation request, the controller is to release the portion of storage space via the reservation table.
    Type: Grant
    Filed: September 25, 2014
    Date of Patent: January 1, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Jin Wang, Roopesh Kumar Tamma, Siamak Nazari, Srinivasa D Murthy
  • Publication number: 20180314570
    Abstract: Examples include transaction management for a multi-node cluster. Some examples include generating a request log entry at an owner node that identifies a duplicate data location, tagging the duplicate data location with a requested tag, and issuing a zero-copy request that identifies the duplicate data location. In some such examples, a service node may generate a service log entry based on the zero-copy request that identifies the duplicate data location, process the zero-copy request, and tag the duplicate data location with a serviced tag. A determination may be made as to whether at least one of the owner node and the service node have failed and based on the determination that at least one has failed, the failed node may be recovered via at least one of the requested tag and the serviced tag of the duplicate data location.
    Type: Application
    Filed: March 31, 2016
    Publication date: November 1, 2018
    Inventors: Siamak Nazari, Jin Wang, Jonathan Stewart, Roopesh Kumar Tamma
  • Publication number: 20180285074
    Abstract: Example method includes: negotiating, with a client device, a number of simultaneous I/O commands allowed in a single session between a storage device and the client device; pre-allocating a number of immediate data buffers for the single session based on the negotiated number of simultaneous I/O commands; receiving a write I/O command with immediate data, wherein the immediate data is transmitted within a single PDU as the I/O command; transitioning the pre-allocated buffers from a network interface state to a driver state in an atomic operation, the driver state enabling the pre-allocated buffers to be accessed by a driver layer of the storage device exclusively, and the atomic operation preventing other I/O commands from transitioning the network interface state of the pre-allocated buffers until the atomic operation is completed; and writing the immediate data to the pre-allocated buffers that are in the driver state.
    Type: Application
    Filed: March 31, 2017
    Publication date: October 4, 2018
    Inventors: Gurinder Shergill, Roopesh Kumar Tamma, Thomas H. Mariette
  • Publication number: 20180173731
    Abstract: An example storage system may include storage media and a storage controller. The storage controller may be to establish virtual volumes, private data stores, and a deduplication data store, each being a virtual storage space of the storage media, wherein each of the private data stores is associated with one of the virtual volumes and the deduplication data store is shared among the virtual volumes. The storage controller may, in response to receiving input data that is to be stored in a given one of the virtual volumes, determine a signature for the input data and select between storing the input data in the private data store associated with the given one of the virtual volumes and storing the input data in the deduplication data store.
    Type: Application
    Filed: December 21, 2016
    Publication date: June 21, 2018
    Inventors: Siamak Nazari, Jin Wang, Srinivasa D. Murthy, Roopesh Kumar Tamma
  • Publication number: 20170371527
    Abstract: Systems, methods, and software are disclosed herein for enhancing group collaboration in the context of productivity applications. In an implementation, a productivity application includes a user interface in which a document may be presented. In addition, a view of a groups feature provided by a social network service may be presented in the user interface to the productivity application. The view may include various options or interacting with the groups feature, such as the ability to create a new group, the ability to post comments to a group in the social network service, and the ability to upload documents to a group.
    Type: Application
    Filed: June 23, 2016
    Publication date: December 28, 2017
    Inventors: Stéphane Morichère-Matte, Michael Anthony Navarro, Om Krishna, Michael Andrew Griscom, Vidyaraman Sankaranarayanan, Roopesh Kumar Rajamani, Darron J. Stepanich, Peter John Daoud, Alvin Ji-Fung Lao, Gregory Iannacone, Ronald Nikolai Bartlett Savas, Grace Lam, Sumanth Pasupuleti
  • Patent number: 9830239
    Abstract: A failure at a first port of the controller node is detected, where the first port is initially assigned a first port identifier and is associated with a logical path through a communications fabric between the first port and a port at a host device. In response to detecting the failure, the first port identifier is assigned to a second port to cause the logical path to be associated with the second port. In response to detecting resolution of the failure, a probe identifier is assigned to the first port. Using the probe identifier, a health of network infrastructure between the first port and the host device is checked. In response to the checking, the first port identifier is assigned to the first port to cause failback of the logical path to the first port.
    Type: Grant
    Filed: January 30, 2013
    Date of Patent: November 28, 2017
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Siamak Nazari, Roopesh Kumar Tamma, Nigel Kerr
  • Publication number: 20170308315
    Abstract: Example implementations relate to storage space allocation. For example, an implementation includes an apparatus including a controller. The controller is to receive an allocation request from a host computing device. The controller is also to reserve a portion of storage space in the storage device via a reservation table based on the allocation request. The controller is further to determine a type of the allocation request. The type of the allocation request includes a space-optimized allocation request and a non-space-optimized allocation request. When the type of the allocation request corresponds to the non-space-optimized allocation request, the controller is to commit the portion of storage space via an allocation table. When the type of the allocation request corresponds to the space-optimized allocation request, the controller is to release the portion of storage space via the reservation table.
    Type: Application
    Filed: September 25, 2014
    Publication date: October 26, 2017
    Inventors: Jin Wang, Roopesh Kumar Tamma, Siamak Nazari, Srinivasa D Murthy
  • Publication number: 20170300266
    Abstract: Example implementations relate to data chunk storage. For example, an implementation includes an apparatus that includes a processor. The processor is to receive a first data chunk from a source device and to generate a first fingerprint of the first data chunk. In response to a determination that the first fingerprint matches a second fingerprint of a second data chunk, the processor is to select a storage pool from a plurality of storage pools at a storage device to store the first data chunk based on the first data chunk and based on the second data chunk. The plurality of storage pools includes a first storage pool associated with first particular data chunks with non-colliding fingerprints and a second storage pool associated with second particular data chunks with colliding fingerprints.
    Type: Application
    Filed: September 25, 2014
    Publication date: October 19, 2017
    Inventors: Jin Wang, Siamak Nazari, Roopesh Kumar Tamma, Srinivasa D Murthy
  • Patent number: 9772755
    Abstract: A remote control service on a mobile device interrogates a program on another computing device to obtain metadata describing the structure of information being displayed on the computing device. The remote control service then calculates a different data structure that is used to display a subset of the data on the display screen of the mobile device.
    Type: Grant
    Filed: April 7, 2014
    Date of Patent: September 26, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: John R. Sanders, Kevin H. Kahl, Feng Yu, Jing Han Shiau, Joshua S. Bolduc, Patrick S. Boyd, Kha Lam, David M. Gray, Roopesh Kumar Rajamani
  • Publication number: 20170075625
    Abstract: A port processor to receive a read command in a target port. In response, use the target to process a data transfer that includes use of memory for the read transfer allocated by a storage array controller prior to receipt of the read command by the target port or while processing the data transfer and selectively mark such memory as repurposable. The port processor to receive a write command in the target port. In response to receipt of the write command, use the target to process a data transfer for the initiator associated with the write operation, wherein the process includes use of memory that the storage array controller pre-allocated or allocated based on receipt of the read command by the target port for the transfer to the storage array controller and marked as repurposable.
    Type: Application
    Filed: February 24, 2014
    Publication date: March 16, 2017
    Inventors: Siamak Nazari, Roopesh Kumar Tamma, Ajitkumar A Natarajan
  • Publication number: 20170020531
    Abstract: A system for treating tissue includes a clip assembly including a pair of clip arms, each of the clip arms extending from a proximal end to a distal end, the proximal end of the clip arms connected to one another via a central member slidably received within a channel of a capsule to be moved between a tissue receiving configuration and a closed configuration, a cartridge for encasing the clip assembly including a groove formed therein to accommodate the clip assembly and an opening extending thereinto in communication with a portion of the groove such that the groove is open to an exterior of the cartridge via the opening, and an applicator releasably connectable to the clip assembly to move the clip assembly between the open and closed configurations, a distal portion of the applicator insertable through the opening of the cartridge to be connected to the clip assembly.
    Type: Application
    Filed: July 13, 2016
    Publication date: January 26, 2017
    Inventors: Syed NAVEED, Joshin Sahadevan, Ramu Gangavenkatiah, Gnaneswar Bangaru, Manojkumar Rajanna, Roopesh Kumar
  • Publication number: 20160350012
    Abstract: Techniques to copy data from a source region to a destination region, and to update in cache a source region timestamp and a destination region timestamp.
    Type: Application
    Filed: March 20, 2014
    Publication date: December 1, 2016
    Inventors: Roopesh Kumar Tamma, Jin Wang, Siamak Nazari, Srinivasa D Murthy
  • Publication number: 20160253115
    Abstract: A technique includes receiving a command in a target port, where the command is provided by an initiator and is associated with a write operation. The technique includes, in response to the command, using the target to process a data transfer for the initiator associated with the write operation. The processing includes, based on a characteristic of the command, selectively using memory for the transfer pre-allocated by a storage array controller prior to receipt of the command by the target port or requesting an allocation of memory for the transfer from the storage array controller.
    Type: Application
    Filed: October 31, 2013
    Publication date: September 1, 2016
    Inventors: Roopesh Kumar TAMMA, Siamak NAZARI, Ajitkumar A. NATARAJAN
  • Publication number: 20150370668
    Abstract: A failure at a first port of the controller node is detected, where the first port is initially assigned a first port identifier and is associated with a logical path through a communications fabric between the first port and a port at a host device. In response to detecting the failure, the first port identifier is assigned to a second port to cause the logical path to be associated with the second port. In response to detecting resolution of the failure, a probe identifier is assigned to the first port. Using the probe identifier, a health of network infrastructure between the first port and the host device is checked. In response to the checking, the first port identifier is assigned to the first port to cause failback of the logical path to the first port.
    Type: Application
    Filed: January 30, 2013
    Publication date: December 24, 2015
    Inventors: Siamak Nazari, Roopesh Kumar Tamma, Nigel Kerr
  • Publication number: 20150143271
    Abstract: A remote control service on a mobile device interrogates a program on another computing device to obtain metadata describing the structure of information being displayed on the computing device. The remote control service then calculates a different data structure that is used to display a subset of the data on the display screen of the mobile device.
    Type: Application
    Filed: April 7, 2014
    Publication date: May 21, 2015
    Applicant: Microsoft Corporation
    Inventors: John R. Sanders, Kevin H. Kahl, Feng Yu, Jing Han Shiau, Joshua S. Bolduc, Patrick S. Boyd, Kha Lam, David M. Gray, Roopesh Kumar Rajamani
  • Patent number: 8996783
    Abstract: Each node in a clustered array is the owner of a set of zero logical disks (LDs). Thinly-provisioned VVs (TPVVs) are partitioned so each is mapped to a group of zero LDs from different sets of zero LDs. When there is a change in ownership, the affected zero LDs are switched one at a time so only a group of the TPVVs is affected each time.
    Type: Grant
    Filed: April 29, 2012
    Date of Patent: March 31, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Hueichian Huang, Srinivasa D Murthy, Siamak Nazari, Roopesh Kumar Tamma, Jianding Luo
  • Publication number: 20140293810
    Abstract: The present disclosure is related to a method for identifying optimal influential paths in a distributed network for transmitting information/request to one or more target nodes. The routing server at the source node identifies one or more target nodes in the network based on information. Thereafter, routing server identifies one or more optimal nodes based on influence value associated with each node in network and determines predicted action that will be performed by the optimal node and transmits the information to each optimal node. Each optimal node performs an action upon receiving the information from the source node. The routing server receives the data related to the operation performed and updates influence value associated with respective nodes. The routing server identifies one or more optimal paths based on one of the influence value being updated and the action performed by each optimal node.
    Type: Application
    Filed: March 28, 2014
    Publication date: October 2, 2014
    Inventors: Ajay Kumar NEMA, Manish Kumar NEMA, Mohan Kumar PANDIAN, Roopesh Kumar NEMA, Saravanan SOUPRAMANIANE, Siva Kiran DHULIPALA, Vinoo M. CHACKO
  • Publication number: 20140297887
    Abstract: The present disclosure is related to a method for transmitting information on priority basis to one or more nodes in distributed network. The routing server at source node generates one or more set of nodes from plurality of nodes based on reputation value. The routing server identifies first set of nodes with highest reputation value, determines predicted action to be perforrmed by each node. The routing server transmits information to each node in first set. Each node performs an action. The routing server computes the difference between the predicted action and action performed by each node in the first set and updates the reputation value of each node in the first set. Thereafter, routing server transmits the information the second set, third set and so on.
    Type: Application
    Filed: April 1, 2014
    Publication date: October 2, 2014
    Applicant: WHISTLE TALK TECHNOLOGIES PVT. LTD.
    Inventors: Ajay Kumar NEMA, Manish Kumar NEMA, Mohan Kumar PANDIAN, Roopesh Kumar NEMA, Saravanan SOUPRAMANIANE, Siva Kiran DHULIPALA, Vinoo M. CHACKO
  • Publication number: 20130290642
    Abstract: Each node in a clustered array is the owner of a set of zero logical disks (LDs). Thinly-provisioned VVs (TPVVs) are partitioned so each is mapped to a group of zero LDs from different sets of zero LDs. When there is a change in ownership, the affected zero LDs are switched one at a time so only a group of the TPVVs is affected each time.
    Type: Application
    Filed: April 29, 2012
    Publication date: October 31, 2013
    Inventors: Hueichian Huang, Srinivasa D. Murthy, Siamak Nazari, Roopesh Kumar Tamma, Jianding Luo
  • Publication number: 20070052250
    Abstract: An adjustable backset deadbolt assembly providing operational and structural improvements. The deadbolt assembly can provide adjustability between a first backset dimension and a second backset dimension for allowing installation in doors conforming to various industry standards. The deadbolt assembly can provide adjustability between backset dimensions by relative rotation between the inner bolt housing and the outer housing. The inner bolt housing may be provided with a depressible snap finger to allow insertion of a protrusion thereon into a slot in the outer housing. In some embodiments, the slot is provided substantially helically through an angle of 360 degrees to provide common orientation of parts in each backset dimension. The outer housing may be provided to integrally form a cam housing and a bolt housing.
    Type: Application
    Filed: March 3, 2006
    Publication date: March 8, 2007
    Applicant: Schlage Lock Company
    Inventors: Jerry Bodily, Justin Lotak, Brian Roth, Troy Dalsing, Shivanand Shivalli, Christopher Jayakaran, Roopesh Kumar