Patents by Inventor Sanjay Agarwal
Sanjay Agarwal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140023424Abstract: A hygienic modular writing utensil and method of using for eliminating or minimizing the spread of germs, bacteria and the like between a first and a second user. The utensil has an External Protective Shield with a first holding area for use by the first user and a removable Internal Writing Utensil with a second holding area for use by the second user. The External Protective Shield has an internal cleaning element and the Internal Writing Utensil has a removable cap on its outer end, whereby when the first user pulls the Internal Writing Utensil out from the External Protective Shield or reinserts the Internal Writing Utensil back into the External Protective Shield by grasping the exterior surface of the removable cap, an outer surface of the Internal Writing Utensil, including the second holding area is cleaned.Type: ApplicationFiled: March 15, 2013Publication date: January 23, 2014Inventors: James M. Anderson, Sanjay Agarwal
-
Patent number: 8539545Abstract: An example network system includes a plurality of endpoint computing resources, a business policy graph of a network that includes a set of the plurality of endpoint computing resources configured as a security domain, a set of policy enforcement points (“PEPs”) configured to enforce network policies, and a network management module (“NMM”). The NMM is configured to receive an indication of a set of network policies to apply to the security domain, automatically determine a subset of PEPs of the set of PEPs are required to enforce the set of network policies based on physical network topology information readable by the NMM that includes information about the location of the endpoint computing resources and the set of PEPs within the network, and apply the network policies to the subset of PEPs in order to enforce the network policies against the set of endpoint computing resources of the security domain.Type: GrantFiled: July 22, 2010Date of Patent: September 17, 2013Assignee: Juniper Networks, Inc.Inventors: Anoop Kartha, Kamil Imtiaz, Ahzam Ali, Amarnath Bachhu Satyan, Firdousi Zackariya, Nadeem Khan, Sanjay Agarwal
-
Publication number: 20120074832Abstract: Techniques described herein generally relate to methods of manufacturing devices and devices including a filament having therein or coated with a catalyst and carbon nanotubes. The device may be configured to produce light with a luminary characteristic having a value higher than a value of the luminary characteristic of a device having an uncoated filament at a same operating condition. The luminary characteristic may include one or more of device irradiance or light efficiency. The filament may be a tungsten filament, and the carbon nanotubes may include multiwall carbon nanotubes or single wall carbon nanotubes. The filament may be coated with the carbon nanotubes using one or more deposition techniques including electric arc discharge, laser ablation and chemical vapor deposition (CVD). The filament may be coated with the catalyst using a method including one or more of electroless plating, electroplating, dip coating, spin coating, and radio frequency (RF) sputtering.Type: ApplicationFiled: January 31, 2011Publication date: March 29, 2012Inventors: Kamal Krishna Kar, Raghunandan Sharma, Ariful Rahman, Sanjay Agarwal
-
Publication number: 20120023546Abstract: An example network system includes a plurality of endpoint computing resources, a business policy graph of a network that includes a set of the plurality of endpoint computing resources configured as a security domain, a set of policy enforcement points (“PEPs”) configured to enforce network policies, and a network management module (“NMM”). The NMM is configured to receive an indication of a set of network policies to apply to the security domain, automatically determine a subset of PEPs of the set of PEPs are required to enforce the set of network policies based on physical network topology information readable by the NMM that includes information about the location of the endpoint computing resources and the set of PEPs within the network, and apply the network policies to the subset of PEPs in order to enforce the network policies against the set of endpoint computing resources of the security domain.Type: ApplicationFiled: July 22, 2010Publication date: January 26, 2012Applicant: JUNIPER NETWORKS, INC.Inventors: Anoop V. Kartha, Kamil Imtiaz, Ahzam Ali, Amarnath Bachhu Satyan, Firdousi Zackariya, Nadeem Khan, Sanjay Agarwal
-
Patent number: 7836028Abstract: A versioned relational database system (VRDBS) in which versions of data contained in a relational database system are accessed by means of workspaces. Metadata in the VRDBS permits a workspace to have multiple parents. The multi-parented VRDBS performs operations including specifying that a workspace be made an additional parent of another workspace or that an additional parent be removed as a parent of the other workspace. The fact that a workspace may have multiple parents affects the manner in which merge and refresh operations are performed and the manner in which system-enforced constraints such as primary key constraints, unique key constraints, and referential integrity constraints are handled. The metadata for the VRDBMS includes a multi-parent graph for each workspace that has multiple parents. The multi-parent graph is used in the performance of the merge and refresh operations and in determining constraint violations.Type: GrantFiled: July 25, 2002Date of Patent: November 16, 2010Assignee: Oracle International CorporationInventors: Sanjay Agarwal, Ramkrishna Chatterjee
-
Publication number: 20100099441Abstract: Methods and systems for mobile advertising that include receiving an advertisement banner from an advertiser, incorporating identifying information in to the advertisement banner to produce a modified advertisement banner, and displaying the modified advertisement banner on a display of a mobile device are disclosed.Type: ApplicationFiled: October 17, 2008Publication date: April 22, 2010Inventors: Sanjay Agarwal, Jennifer Liu Low, Daniel T. Erat, Jennifer W. Lin, Sridhar Venkatakrishnan
-
Patent number: 7593334Abstract: According to one embodiment, a method of regulating traffic at a network hardware machine is disclosed. The method includes receiving a data packet, calculating a time stamp difference value, determining whether a maximum token bucket value has been exceeded by the time stamp difference value and determining whether there are enough tokens to transmit the packet.Type: GrantFiled: May 20, 2002Date of Patent: September 22, 2009Assignee: Altera CorporationInventors: Neil Mammen, Sanjay Agarwal
-
Patent number: 7277437Abstract: According to one embodiment, a network hardware machine is disclosed. The network hardware machine includes a central processing unit (CPU) that processes data packets received at the network hardware machine, and a classifier, coupled to the CPU, that classifies the packets prior to the packets being received at the CPU.Type: GrantFiled: May 20, 2002Date of Patent: October 2, 2007Assignee: Altera CorporationInventors: Neil Mammen, Mammen Thomas, Sanjay Agarwal, M. Varghese Ninan
-
Patent number: 7028057Abstract: Techniques for doing optimistic constraint checking in a versioned relational database system. The techniques find a subset of the versions of a table that contain all of the rows that need be checked for violation of a constraint when a given version is modified. When the versions of a table are organized into a directed acyclic graph (DAG), the subset for a given version is the ancestry of the given version, that is, the given version plus the ancestors of the given version in the DAG. Within the ancestry, the set of rows that must be checked is termed the version view. A row that belongs to the set has a primary key that is the latest version of the primary key in the given version's ancestry. The technique may be used for constraints including the referential integrity constraint and the unique key constraint. The metadata used to compute the version view is disclosed, as well as the manner in which the constraint checking techniques interact with the workspaces that provide access to the versions.Type: GrantFiled: July 25, 2002Date of Patent: April 11, 2006Assignee: Oracle International CorporationInventors: Ramesh Vasudevan, Sanjay Agarwal, Ramkrishna Chatterjee, Benjamin Speckhard
-
Patent number: 6557012Abstract: A version control system is described for use in connection with a database management system to facilitate versioning of a database table, the system including a database table and a version control module. The database table comprises a plurality of records, each record including at least one data field for storing user data and at least some of the records including a version control field including version control information. The version control module is configured to, in response to a user query related to the database table and related to a version, generate an augmented query for processing by the database management system, the augmented query relating to the user query and the version control information.Type: GrantFiled: April 22, 2000Date of Patent: April 29, 2003Assignee: Oracle CorpInventors: Gopalan Arun, Ramesh Vasudevan, Sanjay Agarwal
-
Publication number: 20020166075Abstract: Industrial electronics and many consumer applications need lower cost, lower power consumption, control processing, and some DSP function capability. The technique described implements a system design with industrial and consumer applications in mind. The processor coprocessor architecture with freeze state method to implement power management also provides efficient software programming. Higher number of DSP computations can be programmed as hardware coprocessors functions. Recognizing the completion of DSP computation and implementing power management based on that can be a hardware function. This method of combining DSP computations and power management results in system that can find widespread use in industrial and consumer applications. The technique of using freeze state and implementing power management can also be used in non-battery applications in which power conservation is required.Type: ApplicationFiled: May 4, 2001Publication date: November 7, 2002Inventors: Sanjay Agarwal, Sapna Agrawal
-
Publication number: 20020156994Abstract: A method for implementing coprocessors for control processors uses synchronous logic design method to achieve low cost and high performance in control processors. The coprocessor comprising of signed two's complement multiplication, signed divide, shift left and shift right, and normalization comprises of most of the math functions required for implementing digital signal processing algorithms. The processor coprocessor architecture uses data dependency to compute the time duration required to perform the math computation. This results in efficient implementation of DSP algorithms and eventually translates to better system level performance. The technique described to implement math computations uses a register file interface, existing instruction set, and existing legacy software development infrastructure to implement DSP systems.Type: ApplicationFiled: April 24, 2001Publication date: October 24, 2002Inventors: Sanjay Agarwal, Sapna Agrawal
-
Publication number: 20020147155Abstract: Disclosed are methods of treating endometriosis in a woman or of preventing endometriosis in a woman at higher than normal risk of developing or suffering recurrence of endometriosis. The inventive methods involve administering to the woman a pharmaceutically acceptable composition containing an aryl hydrocarbon receptor binding ligand, such as indole-3-carbinol, indole-4-carbinol, indole-5-carbinol, diindolylmethane, tryptophan, tryptamine, indole acetic acid, or glucosinolate compounds.Type: ApplicationFiled: April 6, 2001Publication date: October 10, 2002Inventors: Warren G. Foster, Sanjay Agarwal, Claude L. Hughes
-
Publication number: 20020133728Abstract: A method for power management and energy conservation in computer networking equipment uses the information on network traffic intensity. The cooling and ventilation provided is directly proportional to network traffic intensity. The traffic intensity information is conveyed to the power management processor, which uses pulse width modulation (PWM) to control cooling and ventilation fans in the equipment. Traffic intensity is proportional to the switching activity in integrated circuits. Switching activity in integrated circuits is proportional to the heat generation in integrated circuits. Higher traffic intensity results in higher heat generation, which correspondingly results in higher cooling and ventilation requirements. The cooling and ventilation should adapt dynamically to the requirements of the system. This adaptation and optimal application of cooling and ventilation in networking equipment provides reduction in power usage in the system equipment.Type: ApplicationFiled: January 16, 2001Publication date: September 19, 2002Inventor: Sanjay Agarwal