Patents by Inventor Scott Brender
Scott Brender has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230066840Abstract: Using metadata for a contentless file to provide a guest context access to file content. Within a guest context, a file system is mounted from a container image which lacks a first file's content and which includes metadata defining properties of the first file and mapping data defining information for identifying a second file within another filesystem from which the first file's content is obtainable Based on the properties, a filesystem operation involving the first file is performed without switching to a host context, and a requested access to the first file's content is responded to. Responding includes, based on the mapping data, communicating a request for the host context to supply the first file's content and, after returning from a context switch, responding to the requested access by supplying content of the second file from guest memory page(s) which are mapped to host memory page(s) containing the second file's content.Type: ApplicationFiled: January 27, 2021Publication date: March 2, 2023Inventors: Ping XIE, Scott BRENDER, Shaheed Gulamabbas CHAGANI, John Andrew STARKS, Arun U. KISHAN
-
Patent number: 11544094Abstract: Methods, systems, and computer storage media for providing a set of common flat files in a composite image that can be mounted as a container (i.e., composite container) to support isolation and interoperation of computing resources. Container management is provided for a container management system based on a composite image file system engine that executes composite operations to support resource isolation and operating system (OS) virtualization functionality. In particular, a container engine interface supports creating, mounting, and providing access to and from composite images or composite containers. In operation, a plurality of files for generating a composite image are accessed. The composite image for the plurality of files is generated. The composite image includes a set of common flat files. The composite image is communicated to cause mounting of the composite image, where mounting the composite image is based on a metadata file from the set of common flat files.Type: GrantFiled: October 29, 2019Date of Patent: January 3, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: John Andrew Starks, Scott A. Brender, Shaheed Gulamabbas Chagani, Ping Xie
-
Patent number: 11544095Abstract: Methods, systems, and computer storage media for providing a set of common flat files in a composite image that can be mounted as a container (i.e. composite container) to support isolation and interoperation of computing resources. Container management is provided for a container management system based on a composite image file system engine that executes composite operations. In particular, a remote sharing manager operates with a composite engine interface to support generating composite images configured for split layer memory sharing, split layer direct access memory sharing, and dynamic base images. In operation, a plurality of files and a selection of a remote sharing configuration for generating a composite image are accessed. The composite image for the plurality of files and the remoting sharing configuration is generated. The composite image is communicated to cause sharing of the composite image, sharing of the composite image is based on the remote sharing configuration.Type: GrantFiled: October 29, 2019Date of Patent: January 3, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: John Andrew Starks, Scott A. Brender, Shaheed Gulamabbas Chagani, Ping Xie
-
Patent number: 11507407Abstract: Methods, systems, and computer storage media for providing a set of common flat files in a composite image that can be mounted as a container (i.e. composite container) to support isolation and interoperation of computing resources. Container management is provided for a container management system based on a composite image file system engine that executes composite operations. In particular, a remote sharing manager operates with a composite engine interface to support generating composite images configured for split layer memory sharing, split layer direct access memory sharing, and dynamic base images. In operation, a plurality of files and a selection of a remote sharing configuration for generating a composite image are accessed. The composite image for the plurality of files and the remoting sharing configuration is generated. The composite image is communicated to cause sharing of the composite image, sharing of the composite image is based on the remote sharing configuration.Type: GrantFiled: October 29, 2019Date of Patent: November 22, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: John Andrew Starks, Scott A. Brender, Shaheed Gulamabbas Chagani, Ping Xie
-
Patent number: 11507406Abstract: Methods, systems, and computer storage media for providing a set of common flat files in a composite image that can be mounted as a container (i.e., composite container) to support isolation and interoperation of computing resources. Container management is provided for a container management system based on a composite image file system engine that executes composite operations to support resource isolation and operating system (OS) virtualization functionality. In particular, a container engine interface supports creating, mounting, and providing access to and from composite images or composite containers. In operation, a plurality of files for generating a composite image are accessed. The composite image for the plurality of files is generated. The composite image includes a set of common flat files. The composite image is communicated to cause mounting of the composite image, where mounting the composite image is based on a metadata file from the set of common flat files.Type: GrantFiled: October 29, 2019Date of Patent: November 22, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: John Andrew Starks, Scott A. Brender, Shaheed Gulamabbas Chagani, Ping Xie
-
Patent number: 10996897Abstract: Storage virtualization techniques allow directories to be stored remotely, for example, by a cloud storage provider, but in a manner that appears to a user or application running on a local computing device as if the directories are stored locally—even though the data of those directories may not be resident on the local computing device. That is, the contents of directories that may exist in the cloud look and behave as if they were stored locally on a computing device.Type: GrantFiled: April 21, 2017Date of Patent: May 4, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Neal R. Christiansen, Ravisankar V Pudipeddi, Scott A. Brender, Sarosh C. Havewala, Ping Xie, Craig Ashley Barkhouse, Lei Shi
-
Publication number: 20200409736Abstract: Methods, systems, and computer storage media for providing a set of common flat files in a composite image that can be mounted as a container (i.e. composite container) to support isolation and interoperation of computing resources. Container management is provided for a container management system based on a composite image file system engine that executes composite operations. In particular, a remote sharing manager operates with a composite engine interface to support generating composite images configured for split layer memory sharing, split layer direct access memory sharing, and dynamic base images. In operation, a plurality of files and a selection of a remote sharing configuration for generating a composite image are accessed. The composite image for the plurality of files and the remoting sharing configuration is generated. The composite image is communicated to cause sharing of the composite image, sharing of the composite image is based on the remote sharing configuration.Type: ApplicationFiled: October 29, 2019Publication date: December 31, 2020Inventors: JOHN ANDREW STARKS, SCOTT A. BRENDER, SHAHEED GULAMABBAS CHAGANI, PING XIE
-
Publication number: 20200409723Abstract: Methods, systems, and computer storage media for providing a set of common flat files in a composite image that can be mounted as a container (i.e. composite container) to support isolation and interoperation of computing resources. Container management is provided for a container management system based on a composite image file system engine that executes composite operations to support resource isolation and operating system (OS) virtualization functionality. In particular, a layout manager operates with a composite engine interface to support generating composite images with optimized configurations (i.e., pre-alignment and pre-computed hashes of for executable files). In operation, a plurality of files for generating a composite image are accessed.Type: ApplicationFiled: October 29, 2019Publication date: December 31, 2020Inventors: JOHN ANDREW STARKS, SCOTT A. BRENDER, SHAHEED GULAMABBAS CHAGANI, PING XIE
-
Publication number: 20200409921Abstract: Methods, systems, and computer storage media for providing a set of common flat files in a composite image that can be mounted as a container (i.e., composite container) to support isolation and interoperation of computing resources. Container management is provided for a container management system based on a composite image file system engine that executes composite operations to support resource isolation and operating system (OS) virtualization functionality. In particular, a container engine interface supports creating, mounting, and providing access to and from composite images or composite containers. In operation, a plurality of files for generating a composite image are accessed. The composite image for the plurality of files is generated. The composite image includes a set of common flat files. The composite image is communicated to cause mounting of the composite image, where mounting the composite image is based on a metadata file from the set of common flat files.Type: ApplicationFiled: October 29, 2019Publication date: December 31, 2020Inventors: JOHN ANDREW STARKS, SCOTT A. BRENDER, SHAHEED GULAMABBAS CHAGANI, PING XIE
-
Patent number: 10802764Abstract: Storage virtualization techniques allow directories to be stored remotely, for example, by a cloud storage provider, but in a manner that appears to a user or application running on a local computing device as if the directories are stored locally—even though the data of those directories may not be resident on the local computing device. That is, the contents of directories that may exist in the cloud look and behave as if they were stored locally on a computing device.Type: GrantFiled: April 21, 2017Date of Patent: October 13, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Neal R. Christiansen, Ravisankar V Pudipeddi, Scott A. Brender, Sarosh C. Havewala, Ping Xie, Craig Ashley Barkhouse, Lei Shi
-
Patent number: 10509730Abstract: A method and a processing device are provided for sequentially aggregating data to a write log included in a volume of a random-access medium. When data of a received write request is determined to be suitable for sequentially aggregating to a write log, the data may be written to the write log and a remapping tree, for mapping originally intended destinations on the random-access medium to one or more corresponding entries in the write log, may be maintained and updated. At time periods, a checkpoint may be written to the write log. The checkpoint may include information describing entries of the write log. One or more of the checkpoints may be used to recover the write log, at least partially, after a dirty shutdown. Entries of the write log may be drained to respective originally intended destinations upon an occurrence of one of a number of conditions.Type: GrantFiled: August 4, 2016Date of Patent: December 17, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Shi Cong, Scott Brender, Karan Mehra, Darren G. Moss, William R. Tipton, Surendra Verma
-
Patent number: 10223378Abstract: The techniques and systems described herein determine whether or not to implement reparse behavior in association with a file or a directory access. A file system and/or a file system filter can receive, from a host system component, a request to open a file or a directory. While attempting to access the file or the directory, a reparse tag associated with an intermediate directory is encountered. The file system can then determine whether a next node, along an access path for the file or the directory to be opened, exists in the intermediate directory. That is, the file system can look beyond the reparse tag and into the intermediate directory to determine if the next node exists. Subsequently, the file system and/or the file system filter can decide whether to implement reparse behavior based on the reparse tag and whether the next node exists in the intermediate directory.Type: GrantFiled: August 12, 2016Date of Patent: March 5, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Neal R. Christiansen, Scott Brender, Sarosh Havewala, Craig Barkhouse
-
Patent number: 10140461Abstract: The techniques and systems described herein reduce the amount of storage resources consumed by containers by creating placeholder files in container namespaces. The placeholder files are associated with read-only access to corresponding shared files stored in a read-only namespace. The read-only namespace can be accessible to multiple different containers. This increases the storage density for a storage unit because more containers can be executed from the same storage unit. The techniques and systems described herein further reduce the amount of storage resources consumed by containers by creating placeholder directories. The techniques and systems described herein also reduce the amount of memory storage resources consumed by containers to execute files by using a shared execution memory area.Type: GrantFiled: March 18, 2016Date of Patent: November 27, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Neal R. Christiansen, Scott Brender, Sarosh Havewala, Malcolm James Smith
-
Publication number: 20180129666Abstract: The state of a file may be a combination of local state, typically small (e.g., a placeholder file), and some external source state such as that maintained in a read-only namespace managed by a cloud provider or by another local file system, typically large. A file system component responsible for overlaying (i.e., merging) the partial local state and the external source state into a single file system view that can be used by an application of a container as if the full state exists locally. Overlays that comprise the file system state may be referred to as “layers”. A tombstone mechanism may be provided to record delete or rename modifications in the top layer.Type: ApplicationFiled: June 21, 2017Publication date: May 10, 2018Inventors: Sarosh C. Havewala, Scott A. Brender, Shaheed Chagani
-
Publication number: 20180060350Abstract: Storage virtualization techniques allow directories to be stored remotely, for example, by a cloud storage provider, but in a manner that appears to a user or application running on a local computing device as if the directories are stored locally—even though the data of those directories may not be resident on the local computing device. That is, the contents of directories that may exist in the cloud look and behave as if they were stored locally on a computing device.Type: ApplicationFiled: April 21, 2017Publication date: March 1, 2018Inventors: Neal R. Christiansen, Ravisankar V. Pudipeddi, Scott A. Brender, Sarosh C. Havewala, Ping Xie, Craig Ashley Barkhouse, Lei Shi
-
Publication number: 20180059990Abstract: Storage virtualization techniques allow files to be stored remotely, for example, by a cloud storage provider, but in a manner that appears to a user or application running on a local computing device as if the files are stored locally—even though the data of those files may not be resident on the local computing device. That is, the contents of files that may exist in the cloud look and behave as if they were stored locally on a computing device.Type: ApplicationFiled: April 21, 2017Publication date: March 1, 2018Inventors: Neal R. Christiansen, Ravisankar V. Pudipeddi, Scott A. Brender, Sarosh C. Havewala, Ping Xie, Craig Ashley Barkhouse, Lei Shi
-
Publication number: 20170124113Abstract: The techniques and systems described herein determine whether or not to implement reparse behavior in association with a file or a directory access. A file system and/or a file system filter can receive, from a host system component, a request to open a file or a directory. While attempting to access the file or the directory, a reparse tag associated with an intermediate directory is encountered. The file system can then determine whether a next node, along an access path for the file or the directory to be opened, exists in the intermediate directory. That is, the file system can look beyond the reparse tag and into the intermediate directory to determine if the next node exists. Subsequently, the file system and/or the file system filter can decide whether to implement reparse behavior based on the reparse tag and whether the next node exists in the intermediate directory.Type: ApplicationFiled: August 12, 2016Publication date: May 4, 2017Inventors: Neal R. Christiansen, Scott Brender, Sarosh Havewala, Craig Barkhouse
-
Publication number: 20170124345Abstract: The techniques and systems described herein reduce the amount of storage resources consumed by containers by creating placeholder files in container namespaces. The placeholder files are associated with read-only access to corresponding shared files stored in a read-only namespace. The read-only namespace can be accessible to multiple different containers. This increases the storage density for a storage unit because more containers can be executed from the same storage unit. The techniques and systems described herein further reduce the amount of storage resources consumed by containers by creating placeholder directories. The techniques and systems described herein also reduce the amount of memory storage resources consumed by containers to execute files by using a shared execution memory area.Type: ApplicationFiled: March 18, 2016Publication date: May 4, 2017Inventors: Neal R. Christiansen, Scott Brender, Sarosh Havewala, Malcolm James Smith
-
Publication number: 20160342528Abstract: A method and a processing device are provided for sequentially aggregating data to a write log included in a volume of a random-access medium. When data of a received write request is determined to be suitable for sequentially aggregating to a write log, the data may be written to the write log and a remapping tree, for mapping originally intended destinations on the random-access medium to one or more corresponding entries in the write log, may be maintained and updated. At time periods, a checkpoint may be written to the write log. The checkpoint may include information describing entries of the write log. One or more of the checkpoints may be used to recover the write log, at least partially, after a dirty shutdown. Entries of the write log may be drained to respective originally intended destinations upon an occurrence of one of a number of conditions.Type: ApplicationFiled: August 4, 2016Publication date: November 24, 2016Inventors: Shi Cong, Scott Brender, Karan Mehra, Darren G. Moss, William R. Tipton, Surendra Verma
-
Patent number: 9448890Abstract: A method and a processing device are provided for sequentially aggregating data to a write log included in a volume of a random-access medium. When data of a received write request is determined to be suitable for sequentially aggregating to a write log, the data may be written to the write log and a remapping tree, for mapping originally intended destinations on the random-access medium to one or more corresponding entries in the write log, may be maintained and updated. At time periods, a checkpoint may be written to the write log. The checkpoint may include information describing entries of the write log. One or more of the checkpoints may be used to recover the write log, at least partially, after a dirty shutdown. Entries of the write log may be drained to respective originally intended destinations upon an occurrence of one of a number of conditions.Type: GrantFiled: January 5, 2012Date of Patent: September 20, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Shi Cong, Scott Brender, Karan Mehra, Darren G. Moss, William R. Tipton, Surendra Verma