Patents by Inventor Tathagata Das

Tathagata Das has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240070138
    Abstract: A method, system, and computer system for performing an operation with respect to a target table are disclosed. The method includes performing first and second jobs, and persist, in one or more deletion vector files, one or more deletion vectors for corresponding rows of the one or more target table files, and obtaining a resulting table based at least in part on the second job resulting file(s). Performing the first job includes determining a set of matching target table files and storing target table information indicating for each of the set of matching target table files, a particular set of rows having matching rows. Performing the second job includes performing a matching action based on matched rows and one or more deletion of vectors associated with previously removed rows of the matching target table files and obtaining the second job resulting file(s).
    Type: Application
    Filed: August 25, 2022
    Publication date: February 29, 2024
    Inventors: Bart Samwel, Tathagata Das, Lars Kroll, Yijia Cui, Juliusz Sompolski, Chirstos Stavrakakis
  • Publication number: 20240069863
    Abstract: A method, system, and computer system for performing an operation with respect to a target table are disclosed. The method includes performing first, second and a third jobs, and obtaining a resulting table based at least in part on the second job resulting file(s) and third job resulting file(s). Performing the first job includes determining a set of matching target table files and storing target table information indicating for each of the set of matching target table files, a particular set of rows having matching rows. Performing the second job includes performing a matching action based on matched rows and obtaining the second job resulting file(s). Performing the third job includes determining unmatched rows for target table files and storing the unmatched rows in third job resulting file(s).
    Type: Application
    Filed: August 25, 2022
    Publication date: February 29, 2024
    Inventors: Bart Samwel, Tathagata Das, Lars Kroll, Yijia Cui, Juliusz Sompolski, Tom Van Bussel
  • Publication number: 20240070155
    Abstract: A method, system, and computer system for performing an operation with respect to a target table are disclosed. The method includes performing first and second jobs, and obtaining other resulting files based at least in part on a second set of unmatched rows among the target table and the source table that results from the first set of unmatched rows having been processed in the second job, and obtaining a resulting table based on (i) second job resulting file(s), and (ii) other resulting files. Performing the first job includes determining a set of matching target table files and storing target table information indicating for each of the set of matching target table files, a particular set of rows having matching rows. Performing the second job includes performing a first matching action based on matched rows and a second matching action based on a subset of unmatched rows.
    Type: Application
    Filed: August 25, 2022
    Publication date: February 29, 2024
    Inventors: Bart Samwel, Tathagata Das, Lars Kroll, Yijia Cui, Juliusz Sompolski, Tom Van Bussel
  • Publication number: 20240070153
    Abstract: A method, system, and computer system for performing an operation with respect to a target table are disclosed. The method includes performing first and second jobs, obtaining one or more other resulting files based at least in part on unmatched rows, and obtaining a set of processed files based at least in part on performing a post-processing operation with respect to the set of resulting files. The set of processed files has less files than the set of resulting files. Performing the first job includes determining a set of matching target table files and storing target table information indicating for each of the set of matching target table files, a particular set of rows having matching rows. Performing the second job includes performing a matching action based on matched rows and obtaining the second job resulting file(s).
    Type: Application
    Filed: August 25, 2022
    Publication date: February 29, 2024
    Inventors: Bart Samwel, Tathagata Das, Lars Kroll, Yijia Cui, Juliusz Sompolski, Tom Van Bussel, Prakhar Jain
  • Publication number: 20230141556
    Abstract: A system for executing a streaming query includes an interface and a processor. The interface is configured to receive a logical query plan. The processor is configured to determine a physical query plan based at least in part on the logical query plan. The physical query plan comprises an ordered set of operators. Each operator of the ordered set of operators comprises an operator input mode and an operator output mode. The processor is further configured to execute the physical query plan using the operator input mode and the operator output mode for each operator of the query.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 11, 2023
    Inventors: Michael Paul Armbrust, Tathagata Das, Shi Xin, Matei Zaharia
  • Patent number: 11567900
    Abstract: The interface is to receive an indication to execute an optimize command. The processor is to receive a file name; determine whether adding a file of the file name to a current bin causes the current bin to exceed a threshold; associate the file with the current bin in response to determining that adding the file does not cause the current bin to exceed the bin threshold; in response to determining that adding the file to the current bin causes the current bin to exceed the bin threshold: associate the file with a next bin, indicate that the current bin is closed, and add the current bin to a batch of bins; determine whether a measure of the batch of bins exceeds a batch threshold; and in response to determining that the measure exceeds the batch threshold, provide the batch of bins for processing.
    Type: Grant
    Filed: July 23, 2021
    Date of Patent: January 31, 2023
    Assignee: Databricks, Inc.
    Inventors: Rahul Shivu Mahadev, Burak Yavuz, Tathagata Das
  • Patent number: 11514045
    Abstract: A system for executing a streaming query includes an interface and a processor. The interface is configured to receive a logical query plan. The processor is configured to determine a physical query plan based at least in part on the logical query plan. The physical query plan comprises an ordered set of operators. Each operator of the ordered set of operators comprises an operator input mode and an operator output mode. The processor is further configured to execute the physical query plan using the operator input mode and the operator output mode for each operator of the query.
    Type: Grant
    Filed: December 19, 2019
    Date of Patent: November 29, 2022
    Assignee: Databricks Inc.
    Inventors: Michael Paul Armbrust, Tathagata Das, Shi Xin, Matei Zaharia
  • Publication number: 20200257689
    Abstract: A system for executing a streaming query includes an interface and a processor. The interface is configured to receive a logical query plan. The processor is configured to determine a physical query plan based at least in part on the logical query plan. The physical query plan comprises an ordered set of operators. Each operator of the ordered set of operators comprises an operator input mode and an operator output mode. The processor is further configured to execute the physical query plan using the operator input mode and the operator output mode for each operator of the query.
    Type: Application
    Filed: December 19, 2019
    Publication date: August 13, 2020
    Inventors: Michael Paul Armbrust, Tathagata Das, Shi Xin, Matei Zaharia
  • Patent number: 10558664
    Abstract: A system for executing a streaming query includes an interface and a processor. The interface is configured to receive a logical query plan. The processor is configured to determine a physical query plan based at least in part on the logical query plan. The physical query plan comprises an ordered set of operators. Each operator of the ordered set of operators comprises an operator input mode and an operator output mode. The processor is further configured to execute the physical query plan using the operator input mode and the operator output mode for each operator of the query.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: February 11, 2020
    Assignee: Databricks Inc.
    Inventors: Michael Armbrust, Tathagata Das, Shi Xin, Matei Zaharia
  • Publication number: 20180314732
    Abstract: A system for executing a streaming query includes an interface and a processor. The interface is configured to receive a logical query plan. The processor is configured to determine a physical query plan based at least in part on the logical query plan. The physical query plan comprises an ordered set of operators. Each operator of the ordered set of operators comprises an operator input mode and an operator output mode. The processor is further configured to execute the physical query plan using the operator input mode and the operator output mode for each operator of the query.
    Type: Application
    Filed: April 28, 2017
    Publication date: November 1, 2018
    Inventors: Michael Armbrust, Tathagata Das, Shi Xin, Matei Zaharia
  • Patent number: 8359652
    Abstract: An access control anomaly detection system and method to detect potential anomalies in access control permissions and report those potential anomalies in real time to an administrator for possible action. Embodiments of the system and method input access control lists and semantic groups (or any dataset having binary matrices) to perform automated anomaly detection. This input is processed in three broad phases. First, policy statements are extracted from the access control lists. Next, object-level anomaly detection is performed using thresholds by categorizing outliers in the policies discovered in the first phase as potential anomalies. This object-level anomaly detection can yield object-level security anomalies and object-level accessibility anomalies. Group-level anomaly detection is performed in the third phase by using semantic groups and user sets extracted in first phase to find maximal overlaps using group mapping.
    Type: Grant
    Filed: October 31, 2009
    Date of Patent: January 22, 2013
    Assignee: Microsoft Corporation
    Inventors: Ranjita Bhagwan, Tathagata Das, Prasad G. Naldurg
  • Patent number: 8271814
    Abstract: Energy saving virtualization technique embodiments are presented that save energy by virtualizing a network-connected client computer's computing session (or a part thereof) as a virtual machine (VM) and then migrating it between the client computer and a VM server, depending on whether the computing session is active or idle. The client computer VM is migrated to the VM server when the client computer is deemed to be idle, and the VM is migrated back when the client computer is deemed to have re-entered an active condition. When the VM has been migrated away from the client computer and is residing on the VM server, the client computer is put into a sleep mode, thereby saving energy. However, the user's computing session remains alive on the VM server so that ongoing network connections and other activity are not disturbed.
    Type: Grant
    Filed: March 22, 2010
    Date of Patent: September 18, 2012
    Assignee: Microsoft Corporation
    Inventors: Venkata N. Padmanabhan, Ramachandran Ramjee, Tathagata Das, Pradeep Padala
  • Publication number: 20110231680
    Abstract: Energy saving virtualization technique embodiments are presented that save energy by virtualizing a network-connected client computer's computing session (or a part thereof) as a virtual machine (VM) and then migrating it between the client computer and a VM server, depending on whether the computing session is active or idle. The client computer VM is migrated to the VM server when the client computer is deemed to be idle, and the VM is migrated back when the client computer is deemed to have re-entered an active condition. When the VM has been migrated away from the client computer and is residing on the VM server, the client computer is put into a sleep mode, thereby saving energy. However, the user's computing session remains alive on the VM server so that ongoing network connections and other activity are not disturbed.
    Type: Application
    Filed: March 22, 2010
    Publication date: September 22, 2011
    Applicant: Microsoft Corporation
    Inventors: Venkata N. Padmanabhan, Ramachandran Ramjee, Tathagata Das, Pradeep Padala
  • Publication number: 20110107418
    Abstract: An access control anomaly detection system and method to detect potential anomalies in access control permissions and report those potential anomalies in real time to an administrator for possible action. Embodiments of the system and method input access control lists and semantic groups (or any dataset having binary matrices) to perform automated anomaly detection. This input is processed in three broad phases. First, policy statements are extracted from the access control lists. Next, object-level anomaly detection is performed using thresholds by categorizing outliers in the policies discovered in the first phase as potential anomalies. This object-level anomaly detection can yield object-level security anomalies and object-level accessibility anomalies. Group-level anomaly detection is performed in the third phase by using semantic groups and user sets extracted in first phase to find maximal overlaps using group mapping.
    Type: Application
    Filed: October 31, 2009
    Publication date: May 5, 2011
    Applicant: Microsoft Corporation
    Inventors: Ranjita Bhagwan, Tathagata Das, Prasad G. Naldurg