Tewari, US
Abinas Tewari, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20120197914 | Dynamic Parsing Rules - Methods, program products, and systems implementing dynamic parsing rules are disclosed. Log data from a variety of log producers can be parsed using parsing rules to generate information about an information system. The parsing rules can include system parsing rules and custom parsing rules. A state machine can be used to detect conflicts between various parsing rules. A central server can distribute the system parsing rules and custom parsing rules to one or more remote servers for distributed processing. In a hierarchical parsing system, a first tier parser can be used to identify types of sources generating the log data. Log data from each type of log source can be sent to a second tier parser that corresponds to the type of log source. | 08-02-2012 |
Anoop Tewari, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20150347390 | Compliance Standards Metadata Generation - Compliance standard documents can be automatically processed to generate meta data that can simplify the application of these documents to products, for example, to devise a compliance testing strategy for the products. The meta data can include the relevancy of the compliance standard documents to aspects of standard compliance, which can be established based on a characteristic of keywords found in the documents. The meta data can include clauses in the compliance standard documents that relate to aspects of standard compliance, which can be established based on a presence of the keywords in the clauses. | 12-03-2015 |
Anoop Kailasnath Tewari, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20090007241 | SECURE CONTENT DELIVERY SYSTEM - A secure streaming content delivery system provides a plurality of content servers connected to a network that host customer content that can be cached and/or stored, e.g., images, video, text, and/or software. The content servers respond to requests for customer content from users. The invention load balances user requests for cached customer content to the appropriate content server. A user makes a request to a customer's server/authorization server for delivery of the customer's content. The authorization server checks if the user is authorized to view the requested content. If the user is authorized, then the authorization server generates a hash value using the authorization server's secret key, the current time, a time-to-live value, and any other information that the customer has configured, and embeds it into the URL which is passed to the user. A content server receives a URL request from the user for customer content cached on the content server. The request is verified by the content server creating its own hash value using the customer server's secret key, the current time, a time-to-live value, and any other related information configured for the customer. If the hash value from the URL matches the content server's generated hash value, then the user's request is valid and within the expiration time period and the content server delivers the requested content to the user. | 01-01-2009 |
20100299722 | Secure Content Delivery System - A secure streaming content delivery system provides a plurality of content servers connected to a network that host customer content that can be cached and/or stored, e.g., images, video, text, and/or software. The content servers respond to requests for customer content from users. The invention load balances user requests for cached customer content to the appropriate content server. A user makes a request to a customer's server/authorization server for delivery of the customer's content. The authorization server checks if the user is authorized to view the requested content. If the user is authorized, then the authorization server generates a hash value using the authorization server's secret key, the current time, a time-to-live value, and any other information that the customer has configured, and embeds it into the URL which is passed to the user. A content server receives a URL request from the user for customer content cached on the content server. The request is verified by the content server creating its own hash value using the customer server's secret key, the current time, a time-to-live value, and any other related information configured for the customer. If the hash value from the URL matches the content server's generated hash value, then the user's request is valid and within the expiration time period and the content server delivers the requested content to the user. | 11-25-2010 |
Anshuman Tewari, Plano, TX US
Patent application number | Description | Published |
---|---|---|
20150029394 | DISPLAY POWER REDUCTION USING HISTOGRAM METADATA - A method includes identifying an optimal backlight value for at least one quality level of a first video segment. The method also includes transmitting data for the first video segment. The transmitted data for the first video segment includes a message containing a first set of display adaptation information. The first set of display adaptation information includes the optimal backlight value for the at least one quality level of the first video segment. The method further includes identifying a backlight value for the at least one quality level of a second video segment. The method also includes determining a maximum backlight value change threshold between successive video segments. In addition, the method includes applying temporal smoothing between the optimal backlight value and the backlight value based on the maximum backlight value change threshold. | 01-29-2015 |
Anuj Tewari, Walnut Creek, CA US
Patent application number | Description | Published |
---|---|---|
20160036942 | METHOD, SYSTEM, AND APPARATUS FOR AGENT-BASED ARCHITECTURE FOR INTEGRATED MOBILE APPLICATIONS - Example embodiments of a method, system, and apparatus for agent-based architecture for integrated mobile applications are generally described herein. In an example embodiment, a mobile device includes a client agent module. The client agent module may be configured to receive a request from an integrated mobile application. The client agent module may be configured to determine a communication mode including at least a connected mode, a disconnected mode, and an opportunistic synchronization mode. In the disconnected mode, the client agent module may be configured to satisfy the request using local data, if the request can be satisfied with local data; otherwise the client module may be configured to store the request in local data. In the opportunistic synchronization mode, the client agent module may be configured to select data from the local data associated with the request and send the selected data and the request to the server agent. | 02-04-2016 |
Ashu Tewari, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20140096189 | USING TRUSTED DEVICES TO AUGMENT LOCATION-BASED ACCOUNT PROTECTION - An authentication process receives information identifying a user, a device used by the user and a location in which the device is being used. That authentication process determines whether the location is among a set of familiar locations stored about the user for a service being accessed. If the location is not among the set of familiar locations, then the user is not authenticated. A desirable user experience can be obtained by using information about any existing relationship, such as a synchronization relationship, between the device and the service established at a prior familiar location. Instead of challenging a user whose device is in an unfamiliar location, the authentication process determines whether the device has a relationship established with the service. If the device has a relationship established with the service, then the set of familiar locations is updated to include the location in which the device is being used. | 04-03-2014 |
Ashutosh Tewari, Wethersfield, CT US
Patent application number | Description | Published |
---|---|---|
20140142727 | SPC Fault Detection and Diagnostics Algorithm - A method for diagnosing a fault condition in a climate system is disclosed and a computer program product for doing the same. The climate system may be an HVAC system. The method comprises receiving current data from a climate system in a fault condition, calculating an anomaly score for the climate system from a first set of transition probabilities based on the current data and a second set of transition probabilities based on the climate system operating in a normal condition, and generating automatically a diagnosis of a first problem causing the fault condition when the anomaly score is above a predefined threshold. In an embodiment, the current data may include a plurality of operational Parameters of the climate system. | 05-22-2014 |
Ashutosh Tewari, Freemont, CA US
Patent application number | Description | Published |
---|---|---|
20120265798 | EXTENSION OF SCHEMATIZED XML PROTOCOLS - An application using one version of a schematized XML protocol communicates with another application using a different version of the schematized XML protocol. The different versions may correspond to different deployments or releases of the protocol. Each application generates messages to be sent using two data sets. A first data set is incorporated into the message using elements available in a standard XML protocol schema. A second data set is incorporated into the message using XML annotation elements. The receiving application processes the message using the schematized XML protocol to parse out the first data set. The receiving application further parses the message to identify the second data set that is carried by enhanced XML annotation elements. Extension or annotations are flexibly added to the XML protocol without requiring the client application to request—or the server application to respond to—a pre-negotiated number or type of annotations. | 10-18-2012 |
Ashutosh Tewari, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20120278397 | APPLYING ACTIONS TO ITEM SETS WITHIN A CONSTRAINT - Items of an item set may be stored by an item server (e.g., mail messages comprising a mailbox stored by a mail server) that supports the application of actions, but only within a constraint (e.g., a maximum duration or computational resources consumed by the action). The application of complex actions to large item sets may exceed the constraint if performed in one request. Moreover, the request may be made by a user interface of a user device, but the user interface may stall while interoperating with the item server to perform the action. Instead, a background process may issue a sequence of requests applying the action to respective batches of items within the constraint. This architecture may enable the user interface to remain responsive to the user while the action is performed, and even to be terminated without jeopardizing the completion of the action upon the item set. | 11-01-2012 |
20120290740 | DATA SYNCH NOTIFICATION USING A NOTIFICATION GATEWAY - One or more techniques and/or systems are disclosed for facilitating synchronizing of data between one or more servers and a mobile device. The mobile device can establish which servers comprise data that is to be synchronized, and inform the servers that a push notification gateway should be used to send notifications of a data state change. A connection can be opened between the mobile device and the push notification gateway so that when a data state change is detected by a server the server can send the notification to the gateway, which can forward it to the mobile device. The mobile device may then choose to initiate a data synchronization with the server. In this manner, an open connection is merely maintained between the mobile device and the gateway, as opposed to multiple resource intensive connections between the mobile device and multiple servers. | 11-15-2012 |
20140289339 | GLOBAL EMAIL IDENTITY PREFERENCES - In embodiments of global email identity preferences, a default outgoing email address that is designated by a user is maintained at an email server. The user can also be associated with multiple email addresses that are correlated at the email server. When an outgoing email is received at the email server for delivery to a designated recipient, the outgoing email can be identified as being from one of the multiple email addresses that are associated with the user. A determination is made as to whether to update the outgoing email with the default outgoing email address that is associated with the user, such as if the outgoing email is received from an email client that does not allow user selection of a default client email address. The outgoing email is then routed to the designated recipient for display as being from the default outgoing email address. | 09-25-2014 |
20140289428 | Dynamic Intervals for Synchronizing Data - In embodiments of dynamic intervals for synchronizing data, the data is periodically synchronized between computing devices, such as between server devices, client devices, and/or between client and server devices. A polling optimization service can assess heuristics that are associated with the data synchronizations between the computing devices, and determine optimal dynamic intervals to periodically synchronize the data based on the heuristics. The polling optimization service can then iterate to further assess the heuristics that are associated with subsequent data synchronizations and determine updates of the optimal dynamic intervals. The polling optimization service updates the heuristics based on the subsequent and ongoing data synchronizations, and iterates to update the optimal dynamic intervals based on the updated heuristics. | 09-25-2014 |
20150074210 | APPLYING ACTIONS TO ITEM SETS WITHIN A CONSTRAINT - Items of an item set may be stored by an item server (e.g., mail messages comprising a mailbox stored by a mail server) that supports the application of actions, but only within a constraint (e.g., a maximum duration or computational resources consumed by the action). The application of complex actions to large item sets may exceed the constraint if performed in one request. Moreover, the request may be made by a user interface of a user device, but the user interface may stall while interoperating with the item server to perform the action. Instead, a background process may issue a sequence of requests applying the action to respective batches of items within the constraint. This architecture may enable the user interface to remain responsive to the user while the action is performed, and even to be terminated without jeopardizing the completion of the action upon the item set. | 03-12-2015 |
Ashutosh K. Tewari, Valhalla, NY US
Patent application number | Description | Published |
---|---|---|
20100185154 | URETHRAL CATHETERLESS RADICAL PROSTATECTOMY - A method and device for facilitating the anastomotic healing of a patient after a radical prostatectomy surgical procedure, without a urethral catheter, comprising the steps of performing a radical prostatectomy, fixedly positioning a splinting element between the urethra and the bladder, across the urethral opening, placing the splinting element during the performing of the radical prostatectomy and prior to surgical closure. The fixed positioning is effected from a position within the bladder with anchoring the splinting element in position relative to the interior of the bladder, setting a separate urine drainage tube, and removing the splinting element, after anastomotic healing, with a retrieval element on the splinting element or with dissolving of the splinting element. | 07-22-2010 |
20120277658 | URETHRAL CATHETERLESS RADICAL PROSTATECTOMY - A method and device for facilitating the anastomotic healing of a patient after a radical prostatectomy surgical procedure, without a urethral catheter, comprising the steps of performing a radical prostatectomy, fixedly positioning a splinting element between the urethra and the bladder, across the urethral opening, placing the splinting element during the performing of the radical prostatectomy and prior to surgical closure. The fixed positioning is effected from a position within the bladder with anchoring the splinting element in position relative to the interior of the bladder, setting a separate urine drainage tube, and removing the splinting element, after anastomotic healing, with a retrieval element on the splinting element or with dissolving of the splinting element. | 11-01-2012 |
Claudius Tewari, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20160127520 | PARTITIONING DATA SETS FOR TRANSMISSION ON MULTIPLE PHYSICAL LINKS - The present disclosure discloses a method and a network device for partitioning data sets for transmission on multiple physical links in a network. Specifically, a network device receives a particular data set addressed to a client device. The network device partitions the particular data set into at least a first subset of data and a second subset of data. Then, the network device encapsulates the first subset of data using a first header and encapsulating the second subset of data using a second header that results in (a) data with the first header being transmitted on a first physical link and (b) data with the second header being transmitted on a second physical link different than the first physical link. Finally, the network device transmits the first subset of data with the first header and the second subset of data with the second header. | 05-05-2016 |
Divya Tewari, West Chester, PA US
Patent application number | Description | Published |
---|---|---|
20110048281 | FILM COATING COMPOSITION FROM SOLID POWDER HYDROPHOBIC COMPOUNDS - The present invention relates to a film coating composition used for film coating pharmaceutical tablets, nutritional supplements, confectionary forms and the like. The film coating composition comprises a water soluble film former such as hydroxypropylcellulose, hydroxypropylmethylcellulose, hydroxyethylcellulose, starches, modified starches and the like and one or more hydrophobic compounds, such as metal salt of higher fatty acids, higher fatty alcohol, natural wax either from vegetable, animal origin or synthetic wax. Optionally, the film coating composition may include plasticizers, colorants, such as pigments and/or flow aids. | 03-03-2011 |
20140249235 | Pharmaceutical Compositions With Enhanced Performance and Improved Processability - The presently disclosed and claimed inventive concept(s) relates to a polymer for enhancing drug performance and improving processability. Specifically, the polymer comprises hydroxypropyl methyl cellulose acetate succinate (HPMC-AS). On the HPMC-AS, the percentage of total succinoyl degree of substitution is less than 12% at C6-OH position and greater than 53% at C3-OH, and the percentage of total acetyl degree of substitution is greater than 32% at C6-OH position. | 09-04-2014 |
20140336213 | Abuse Deterrent Compositions and Methods of Making Same - This invention relates a therapeutic pharmaceutical composition comprising: a mixture including an opioid; polyethylene oxide in an amount of about 3 to about 40 wt % of the composition; a disintegrant; and a surfactant; wherein the disintegrant is present in an amount sufficient to cause the pharmaceutical composition to exhibit an immediate release profile. | 11-13-2014 |
20150359895 | COPROCESSED SILICA COATED POLYMER COMPOSITION - The present invention provides a coprocessed excipient composition and a method of producing the same. The coprocessed excipient comprises vinyl lactam derived polymer and a deagglomerated coprocessing agent. The coprocessing agent is fumed silica, colloidal silica or silicon dioxide. The coprocessed excipient is prepared by a continuous process and has a Brookfield cohesion of less than 0.12 kPa, a bulk density of at least 0.249 gram/milliliter and a flow property as measured by Johanson flow rate number increase from 1.1 to 5.0 fold. | 12-17-2015 |
20160120989 | COPROCESSED SILICA COATED POLYMER COMPOSITION - An excipient composition having good bulk density and improved flow characteristics is provided. The present invention particularly provides a coprocessed excipient composition and a method of producing the same. The coprocessed excipient comprises cellulose derived polymer and a deagglomerated coprocessing agent. The coprocessing agent is fumed silica, colloidal silica or silicon dioxide. The coprocessed excipient is prepared in a continuous process and has excellent compactability and improved flow property as measured by Johanson flow rate number increase from 1.1 to 5.0 fold, is characterized by a Brookfield cohesion factor of less than 0.2 kPa and a bulk density of at least 0.249 g/ml. | 05-05-2016 |
Divya Tewari, Suffern, NY US
Manorama Tewari, East Lansdowne, PA US
Patent application number | Description | Published |
---|---|---|
20100255112 | Efficient Nuclear Delivery of Antisense Oligonucleotides or siRNA In Vitro and In Vivo by Nano-Transforming Polymersomes - Provided is a biocompatible polyethylene oxide (PEO)-based polymersome system for the delivery of oligonucleotides, including antisense RNA, siRNA and RNAi, to a cell or tissue target, and method of use therefore, wherein the method comprises encapsulating the oligonucleotide in a biodegradable neutral, nano-transforming polymersome delivery vehicle and delivering the encapsulated oligonucleotide to the cell or tissue target in vitro or in vivo, particularly for treating a disease, such cancer or cellular hyperproliferation. The degradable polymersome, and the oligonucleotides stably encapsulated therein are taken up passively by cells and delivered into endolysosomes, wherein the polymersomes decompose at a known rate at a known pH, thereby releasing encapsulated oligonucleotides in a controlled manner within the cell and facilitating delivery of antisense oligonucleotide or siRNA or RNAi into the nucleus of the cell target. | 10-07-2010 |
Muneesh Tewari, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20110160290 | USE OF EXTRACELLULAR RNA TO MEASURE DISEASE - Stable, extracellular microRNAs and methods for isolating and identifying such microRNAs from a body fluid are provided. The extracellular microRNAs isolated from a bodily fluid of a subject can be used to measure disease and provide sensitive, efficient, and non invasive methods for the detection of disease, including cancer. The extracellular microRNAs can be used to develop new therapeutics for the treatment of disease, including cancer. The examples illustrate diagnosis of prostate and ovarian cancer and differential expression of miR-100, miR-135b, miR-141, miR-148a, miR-200a, miR-200c, miR-210, miR-222, miR-375, miR-425-Sp and miR-429. | 06-30-2011 |
Priyamvada Tewari, Los Angeles, CA US
Patent application number | Description | Published |
---|---|---|
20130162949 | CORNEAL HYDRATION SENSING SYSTEM - A corneal hydration sensing system includes an illumination system configured to provide an illumination beam of terahertz radiation, an optical system arranged in an optical path of the illumination system to relay and direct at least a portion of the illumination beam of terahertz radiation onto a cornea of a subject and to receive at least a portion of terahertz radiation reflected from the cornea to provide a return beam of terahertz radiation, and a detection system arranged in an optical path of the return beam of terahertz radiation. The detection system is configured to provide a detection signal from detecting at least a portion of the return beam of terahertz radiation. The corneal hydration sensing system also includes a signal processing system configured to communicate with the detection system to receive the detection signal. The signal processing system processes the detection signal to provide a measure of an amount of hydration sensed in the cornea of the subject. | 06-27-2013 |
Renu Tewari, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20090055274 | METHOD AND APPARATUS FOR DISTRIBUTED APPLICATION EXECUTION - This invention provides methods and apparatus for executing applications in a distributed manner employing one or more proxy servers and one origin server. The invention allows the applications to be executed primarily at the proxy servers rather than at the origin servers, thereby gaining in scalability and improved user response time. A redirection mechanism is used to direct requests to one of the proxy servers. The proxy server uses caching techniques to bring information records needed for application execution to the proxy servers. The code required for application execution is also obtained from the origin server. The invention discusses applying this technique to three Web-based applications, namely Web-based auctions, generating personalized content for Web-users, and creating advertisements for users accessing a Web page. | 02-26-2009 |
20090307350 | IN-KERNAL CONTENT-AWARE SERVICE DIFFERENTIATION - The increasing number of Internet users and innovative new services such as e-commerce are placing new demands on Web servers. It is becoming essential for Web servers to provide performance isolation, have fast recovery times, and provide continuous service during overload at least to preferred customers. The invention describes a kernel-based architecture for content-aware service differentiation that protects Web servers against overload by controlling the amount and rate of work entering the system. We have invented a mechanism that provides admission control and service differentiation based on connection and application level information. The application header-based connection control uses application-level information (such as URIs and cookies for HTTP) to define different service differentiation actions. The present invention provides the kernel mechanisms that are more efficient and scalable than application level controls implemented in current Web servers. | 12-10-2009 |
20110145307 | DIRECTORY TRAVERSAL IN A SCALABLE MULTI-NODE FILE SYSTEM CACHE FOR A REMOTE CLUSTER FILE SYSTEM - Directory traversal in a scalable multi-node file system cache for a remote cluster file system, is provided. One implementation involves maintaining a scalable multi-node file system cache in a local cluster file system, and caching local file data in the cache by fetching file data on demand from a remote cluster file system into the cache over the network. The local file data corresponds to file data in the remote cluster file system. The local namespace emulates the remote namespace and is created on demand. Access to data further involves performing directory traversal for the cache for the remote cluster file system by creating a directory structure on demand. | 06-16-2011 |
20110145363 | DISCONNECTED FILE OPERATIONS IN A SCALABLE MULTI-NODE FILE SYSTEM CACHE FOR A REMOTE CLUSTER FILE SYSTEM - Facilitating access to data in a network, is provided. One implementation involves maintaining a scalable multi-node file system cache in a local cluster file system, and caching file data in a cache by fetching file data on demand from a remote cluster file system into the local cached file system over the network. The local file data corresponds to file data in the remote cluster file system. Upon disconnection from the remote cluster file system, all file operations are supported at the cache. Then, upon reconnection to the remote cluster file system over the network, the remote cluster file system is synchronized with the information cached in the cache during the disconnection even in the presence of failures. | 06-16-2011 |
20110145367 | SCALABLE CACHING OF REMOTE FILE DATA IN A CLUSTER FILE SYSTEM - Scalable caching of remote file data in cluster file systems is provided. One implementation involves maintaining a cache in a local cluster file system and caching local file data in the cache by fetching file data on demand from the remote cluster file system into the local cached file system over the network. The local file data and metadata corresponds to the remote file data and metadata in the remote cluster file system. Updates made to the local file data and metadata are pushed back to the remote cluster file system asynchronously. | 06-16-2011 |
20110145499 | ASYNCHRONOUS FILE OPERATIONS IN A SCALABLE MULTI-NODE FILE SYSTEM CACHE FOR A REMOTE CLUSTER FILE SYSTEM - Asynchronous file operations in a scalable multi-node file system cache for a remote cluster file system, is provided. One implementation involves maintaining a scalable multi-node file system cache in a local cluster file system, and caching local file data in the cache by fetching file data on demand from the remote cluster file system into the cache over the network. The local file data corresponds to file data in the remote cluster file system. Local file information is asynchronously committed from the cache to the remote cluster file system over the network. | 06-16-2011 |
20110258378 | Optimizing a File System for Different Types of Applications in a Compute Cluster Using Dynamic Block Size Granularity - Embodiments of the invention relate to optimizing a file system for different types of applications in a compute cluster using dynamic block size granularity. An exemplary embodiment includes reserving a predetermined number of storage allocation regions for each node in a cluster, wherein each storage allocation region comprises a set of contiguous data blocks on a single storage disk of locally attached storage; using a contiguous set of data blocks on a single storage disk of locally attached storage as a file system's block allocation granularity for striping data to be stored in the file system for a compute operation in the cluster; and using a single data block of a shared storage subsystem as the file system's block allocation granularity for striping data to be stored in the file system for a data access operation in the cluster. | 10-20-2011 |
20110296422 | Switch-Aware Parallel File System - Embodiments of the invention related to a switch-aware parallel file system. A computing cluster is partitioned into a plurality of computing cluster building blocks comprising a parallel file system. Each computing cluster building block comprises a file system client, a storage module, a building block metadata module, and a building block network switch. The building block metadata module tracks a storage location of data allocated by the storage module within the computing cluster building block. The computing cluster further comprises a file system metadata module that tracks which of the plurality of computing cluster building blocks data is allocated among within the parallel file system. The computing cluster further comprises a file system network switch to provide the parallel file system with access to each of the plurality of computing cluster building blocks and the file system metadata module. At least one additional computing cluster building block is added to the computing cluster, if resource utilization of the computing cluster exceeds a pre-determined threshold. | 12-01-2011 |
20120124009 | AUTOMATIC EXPIRATION OF DATA IN FILE SYSTEMS UNDER CERTAIN SCENARIOS - A system for ensuring data integrity, comprising a plurality of data servers configured in a GPFS configuration, the plurality of data servers comprising an application server comprising a application server fileset, a home server comprising a home server fileset and a gateway server comprising a gateway fileset, a connection monitor node (CMN) coupled to gateway server; and logic, executed by the CMN, for monitoring a connection between the home server and the application server; and if the connection is disconnected, executing logic for comparing a duration of the connection disconnect to a expiration timeout attribute corresponding to the application server fileset and if the duration exceeds the expiration timeout attribute, notifying the application server to set an expiration status attribute in the application fileset. | 05-17-2012 |
20120278283 | CONSISTENT DATA RETRIEVAL IN A MULTI-SITE COMPUTING INFRASTRUCTURE - Embodiments of the invention relate to dynamic application migration in a shared pool of configurable computer resources with disaster recovery support. Data from an application is replicated from local data storage to remote data storage. A consistency point of the data is created in both the local data storage and the remote data storage. The application may be migrated to a second data site with separate local data storage. The migration may be planned or unplanned. Based upon the created consistency point, a consistent set of application data may be requested to support a read operation from the migrated application. | 11-01-2012 |
20120278295 | DISK IMAGE INTROSPECTION FOR STORAGE SYSTEMS - A method for disk image access in a storage system comprises receiving an input/output (I/O) request to a disk image in a file system of a storage system, and in response to the I/O request to the disk image in the file system, reconstructing a file system request. Introspection is performed on the disk image to determine an original file system request based on the I/O request to the disk image. The method further includes laying out a disk image in the file system of the storage system, and performing type-specific introspection on the disk image. Based upon the results of the introspection, data ranges in the disk image are mapped to block or files within the file system. A mapping of disk image data ranges to block or files in the file system is maintained for responding to further I/O requests. | 11-01-2012 |
20120303686 | SCALABLE CACHING OF REMOTE FILE DATA IN A CLUSTER FILE SYSTEM - Scalable caching of remote file data in cluster file systems is provided. One implementation involves maintaining a cache in a local cluster file system and caching local file data in the cache by fetching file data on demand from the remote cluster file system into the local cached file system over the network. The local file data and metadata corresponds to the remote file data and metadata in the remote cluster file system. Updates made to the local file data and metadata are pushed back to the remote cluster file system asynchronously. | 11-29-2012 |
20120311065 | ASYNCHRONOUS FILE OPERATIONS IN A SCALABLE MULTI-NODE FILE SYSTEM CACHE FOR A REMOTE CLUSTER FILE SYSTEM - Asynchronous file operations in a scalable multi-node file system cache for a remote cluster file system, is provided. One implementation involves maintaining a scalable multi-node file system cache in a local cluster file system, and caching local file data in the cache by fetching file data on demand from the remote cluster file system into the cache over the network. The local file data corresponds to file data in the remote cluster file system. Local file information is asynchronously committed from the cache to the remote cluster file system over the network. | 12-06-2012 |
20120323848 | CONTINUOUS AND ASYNCHRONOUS REPLICATION OF A CONSISTENT DATASET - Embodiments of the invention relate to creating and maintaining consistent data sets in a shared pool of configurable computer resources to support disaster recovery support. Data from an application is stored in local data storage and replicated to another data storage. A consistency point of the data is created in both of the data storage, with the consistency point representing an identical data set at a point-in-time. Based upon the created consistency points, a consistent set of application data may be requested to support a read operation for a migrated application. | 12-20-2012 |
20120323850 | CONTINUOUS AND ASYNCHRONOUS REPLICATION OF A CONSISTENT DATASET - Embodiments of the invention relate to creating and maintaining consistent data sets in a shared pool of configurable computer resources to support disaster recovery support. Data from an application is stored in local data storage and replicated to another data storage. A consistency point of the data is created in both of the data storage, with the consistency point representing an identical data set at a point-in-time. Based upon the created consistency points, a consistent set of application data may be requested to support a read operation for a migrated application. | 12-20-2012 |
20130138615 | SYNCHRONIZING UPDATES ACROSS CLUSTER FILESYSTEMS - Embodiments of the invention relate to synchronization of data in a shared pool of configurable computer resources. An image of the filesystem changes, including data and metadata, is captured in the form of a consistency point. Sequential consistency points are created, with changes to data and metadata in the filesystem between sequential consistency captured and placed in a queue for communication to a target filesystem at a target site. The changes are communicated as a filesystem operation, with the communication limited to the changes captured and reflected in the consistency point. | 05-30-2013 |
20130138616 | SYNCHRONIZING UPDATES ACROSS CLUSTER FILESYSTEMS - Embodiments of the invention relate to synchronization of data in a shared pool of configurable computer resources. An image of the filesystem changes, including data and metadata, is captured in the form of a consistency point. Sequential consistency points are created, with changes to data and metadata in the filesystem between sequential consistency captured and placed in a queue for communication to a target filesystem at a target site. The changes are communicated as a filesystem operation, with the communication limited to the changes captured and reflected in the consistency point. | 05-30-2013 |
20130227379 | EFFICIENT CHECKSUMS FOR SHARED NOTHING CLUSTERED FILESYSTEMS - Embodiments of the invention relate to efficiently employing checksums for shared nothing clustered filesystems. Tools are provided to compute the checksum in response to a read transaction and to utilize the computed checksum to prevent serving corrupted data. Multiple levels of data replication are provided. The checksum computation functions within the multiple levels and addresses a specified data block that is the subject of the read transaction. | 08-29-2013 |
20140074802 | SECURE DELETION OPERATIONS IN A WIDE AREA NETWORK - Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and performing a secure deletion of the copy at the home site immediately after a reconnection event of the cache site to the home site. | 03-13-2014 |
20140108732 | CACHE LAYER OPTIMIZATIONS FOR VIRTUALIZED ENVIRONMENTS - Embodiments of the invention relate to optimizing the storage of data in a multi-cache level environment. In one aspect, data is classified into primary and secondary cache sections. Data is differentiated based on an inherent sharing characteristic of the data within a system comprising virtual machines. The data is then placed into the classified sections of the cache storage layer and/or persistent data, reflective of how the data is shared among virtual disk images access by virtual machines. | 04-17-2014 |
20140173185 | Write Performance in Fault-Tolerant Clustered Storage Systems - Embodiments of the invention relate to supporting transaction data committed to a stable storage. Committed data in the cluster is stored in the persistent cache layer and replicated and stored in the cache layer of one or more secondary nodes. One copy is designated as a master copy and all other copies are designated as replica, with an exclusive write lock assigned to the master and a shared write lock extended to the replica. An acknowledgement of receiving the data is communicated following confirmation that the data has been replicated to each node designated to receive the replica. Managers and a director are provided to support management of the master copy and the replicas within the file system, including invalidation of replicas, fault tolerance associated with failure of a node holding a master copy, recovery from a failed node, recovered of the file system from a power failure, and transferring master and replica copies within the file system. | 06-19-2014 |
20140173326 | Write Performance in Fault-Tolerant Clustered Storage Systems - Embodiments of the invention relate to supporting transaction data committed to a stable storage. Committed data in the cluster is stored in the persistent cache layer and replicated and stored in the cache layer of one or more secondary nodes. One copy is designated as a master copy and all other copies are designated as replica, with an exclusive write lock assigned to the master and a shared write lock extended to the replica. An acknowledgement of receiving the data is communicated following confirmation that the data has been replicated to each node designated to receive the replica. Managers and a director are provided to support management of the master copy and the replicas within the file system, including invalidation of replicas, fault tolerance associated with failure of a node holding a master copy, recovery from a failed node, recovered of the file system from a power failure, and transferring master and replica copies within the file system. | 06-19-2014 |
20140317359 | CLUSTERED FILE SYSTEM CACHING - A method for accessing data stored in a distributed caching storage system containing a home cluster and a secondary cluster is provided. A first copy of a file is stored on the home cluster and a second copy of the file is stored on the secondary cluster. The second copy of the file is associated with an inode data structure having a consistency attribute. An input/output request is received directed to the file and indicates that file is in an inconsistent state by updating the inode's consistency attribute. The first copy and the second copy of the file is updated according to the received input/output request and it is determined whether the first copy and the second copy were updated successfully. The maintaining of the inode's consistency attribute is indicative of the inconsistent state of the file. | 10-23-2014 |
20150113222 | Read and Write Requests to Partially Cached Files - Aspects of the invention are provided to support partial file caching on a file system block boundary. All read requests are converted so that offset and count are aligned on a block boundary. Data associated with read requests is first satisfied from local cache, with cache misses supported with a call to persistent or remote system. Similarly, for a write request, any partial blocks are aligned to the block boundary. Data associated with the write request is performed on local cache and placed in a queue for replay to the persistent or remote system. | 04-23-2015 |
20150178015 | DYNAMIC FEEDBACK-BASED THROUGHPUT CONTROL FOR BLACK-BOX STORAGE SYSTEMS - Embodiments of the present invention relate to dynamic feedback-based throughput control for storage systems. In one embodiment, a method of and computer program product for storage throughput control are provided. A plurality of I/O requests is received at a rate controller. The plurality of I/O requests is sent from the rate controller to a storage system at a first rate. Throughput of the storage system is observed. The first rate is dynamically adjusted based on the variance between the observed throughput of the storage system and the first rate. | 06-25-2015 |
20150317250 | Read and Write Requests to Partially Cached Files - Aspects of the invention are provided to support partial file caching on a file system block boundary. All read requests are converted so that offset and count are aligned on a block boundary. Data associated with read requests is first satisfied from local cache, with cache misses supported with a call to persistent or remote system. Similarly, for a write request, any partial blocks are aligned to the block boundary. Data associated with the write request is performed on local cache and placed in a queue for replay to the persistent or remote system. | 11-05-2015 |
20150331925 | Write Performance in Fault-Tolerant Clustered Storage Systems - Embodiments relate to supporting transaction data committed to a stable storage. Committed data in the cluster is stored in the persistent cache layer and replicated and stored in the cache layer of one or more secondary nodes. One copy is designated as a master copy and all other copies are designated as replica, with an exclusive write lock assigned to the master and a shared write lock extended to the replica. An acknowledgement of receiving the data is communicated following confirmation that the data has been replicated to each node designated to receive the replica. Managers and a director are provided to support management of the master copy and the replicas within the file system, including invalidation of replicas, fault tolerance associated with failure of a node holding a master copy, recovery from a failed node, recovered of the file system from a power failure, and transferring master and replica copies within the file system. | 11-19-2015 |
20150350366 | SCALABLE CACHING OF REMOTE FILE DATA IN A CLUSTER FILE SYSTEM - A system facilitates access to data in a network. One implementations includes a caching layer function that is configured to integrate into a local cluster file system, to cache local file data in a cache based on fetching file data on demand from a remote cluster file system, and to operate on a multi-node cache cluster. The cache is visible to file system clients as a Portable Operating System Interface (POSIX) compliant file system, applications execute on the multi-node cache cluster using POSIX semantics via a POSIX compliant file system interface, and data cache is locally consistent for updates made at the multi-node cache cluster using distributed locking for the data cache | 12-03-2015 |
20160078049 | DISK IMAGE INTROSPECTION FOR STORAGE SYSTEMS - A method for disk image access in a storage system includes prefetching a disk image metadata structure. An input/output (I/O) request to the disk image is received. In response to the I/O request, a file system request is reconstructed by laying out the disk image, performing type-specific introspection on the disk image, and mapping data ranges in the disk image to blocks or files within the file system based on results of the introspection. | 03-17-2016 |
20160092132 | Consistent Data Retrieval In A Multi-Site Computing Infrastructure - Embodiments of the invention relate to dynamic application migration in a shared pool of configurable computer resources with disaster recovery support. Write operations are executed by an application at a first data site. Data is generated and stored in first data storage local to the first data site. The stored data is replicated from the first data storage to a backup data storage, and a consistency point of the data is created in both the first data storage and the backup data storage. In response to a local hardware failure at the first data site, an unplanned migration protocol is initialized to migrate the application to a second data site remote from the first data site, which includes re-launching the application at the second data site. Data is transferred from the backup data storage to the second data storage local to the second data site from the consistency point. | 03-31-2016 |
20160103850 | Synchronizing Updates Across Cluster Filesystems - The embodiments described herein relate to synchronization of data in a shared pool of configurable computer resources. One or more consistency points are created in a source filesystem. A first consistency point is compared with a second consistency point to detect a directory change at the source filesystem, which includes identifying at least one difference between the first and second consistency points. A file level change associated with an established directory at a target filesystem is identified responsive to the detection of the directory change. A link is established between the source filesystem and the target filesystem, and the established directory is updated based on the file level change. | 04-14-2016 |
Ritwik Tewari, Woodinville, WA US
Patent application number | Description | Published |
---|---|---|
20110072371 | APPLICATION PROGRAMMING INTERFACE FOR USER INTERFACE CREATION - Various embodiments related to an application programming interface for user interface creation are disclosed herein. For example, one disclosed embodiment provides an application programming interface, embodied on one or more data-holding subsystems, comprising user interface creation services for intermediately defining a user interface including one or more user interface elements as declarative extensible markup language data. The application programming interface further comprises compiler services for providing aspects of the declarative extensible markup language data to one or more compilers for compilation into two or more different machine code implementations, where each machine code implementation is natively executable without a virtual machine by a different hardware platform to present the user interface intermediately defined as declarative extensible markup language data. | 03-24-2011 |
20120324434 | CONTEXT AWARE APPLICATION MODEL FOR CONNECTED DEVICES - An application management system is described herein that uses context information based on what the user is currently doing and what platform the user is using to determine which applications to offer to a user and to affect behavior of applications that the user invokes. The system provides a hardware/software driven policy manager coupled with context data in an application manifest to provide for device- and situation-specific application modes. Such a model leverages device-specific dynamics to create context aware installation, cataloging, management, interaction, and uninstallation of applications, hence providing better user engagement and experience. Thus, the application management system makes it easier for users to find relevant applications, configures applications to work well on the user's present device, and makes application experiences more relevant to what the user is currently doing. | 12-20-2012 |
Ruchir Tewari, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20140281548 | INTRA-COMPUTER PROTECTED COMMUNICATIONS BETWEEN APPLICATIONS - Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed. | 09-18-2014 |
20140282833 | Methods, Systems and Machine-Readable Media For Providing Security Services - Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed. | 09-18-2014 |
20150371045 | METHODS, SYSTEMS AND MACHINE-READABLE MEDIA FOR PROVIDING SECURITY SERVICES - Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed. | 12-24-2015 |
20160112458 | ESTABLISHING TRUST BETWEEN APPLICATIONS ON A COMPUTER - Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed. | 04-21-2016 |
Sanjiv Tewari, Akron, OH US
Patent application number | Description | Published |
---|---|---|
20120167895 | THERAPEUTIC SLEEP DEVICE FOR DISCOURAGING SLEEPING IN A SUPINE POSITION - A therapeutic sleep device worn about an individual's torso and intended to discourage an individual from sleeping in a supine position includes a body securing member and a sleep fin. The body securing member has an interior side and a posterior side. The sleep fin includes a supine-suppression fin providing a right convex surface and a left convex surface tapering from a wider base region to a narrower peak region at which the right and left convex surfaces join at an apex. The apex and at least a portion of the right and left convex surfaces extend beyond said posterior side of the body securing member. A spine indentation formed in the sleep device can help to increase the comfort and improve the securing of the device to a individual. | 07-05-2012 |
Saurabh Tewari, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20090187978 | SECURITY AND AUTHENTICATIONS IN PEER-TO-PEER NETWORKS - A system and method for providing access to a secured data resource to a client on a peer-to-peer network. The system includes a content management server which receives and verifies a first request for access to a secured data resource from the client. If the first request is valid, the content management server generates a second request for access to the secured data resource which comprises peer-to-peer control information and information identifying the secured data resource, and which can additionally include a signature generated using a shared key. The content management transmits the second request to the client, which then retransmits the second request to a peer-to-peer control server. The control server receives the second request and validates it. Such validations can include validating the request with the shared key. If the second request is valid, the control server transmits instructions for accessing the secured data resource back to the client. | 07-23-2009 |
Sudhir K. Tewari, West Chester, OH US
Patent application number | Description | Published |
---|---|---|
20090165988 | TURBINE AIRFOIL CASTING METHOD - A method for making a turbine airfoil includes: (a) providing a mold having: (i) a core; (ii) an outer shell surrounding the core such that the core and the outer shell cooperatively define a cavity in the shape of an airfoil having at least one outer wall; and (iii) a core support extending from the core to the outer shell through a portion of the cavity that defines the at least one sidewall; (b) introducing molten metal alloy into the cavity and surrounding the core support; (c) solidifying the alloy to form an airfoil casting having at least one outer wall which has at least one core support opening passing therethrough; (d) removing the mold so as to expose the airfoil; and (e) sealing the at least one core support opening in the airfoil with a metal alloy metallurgically bonded to the at least one outer wall. | 07-02-2009 |
20100200189 | METHOD OF FABRICATING TURBINE AIRFOILS AND TIP STRUCTURES THEREFOR - A method for making a turbine airfoil includes providing a mold core and an outer shell which cooperatively define a cavity in the shape of a hollow airfoil having an outer wall, a root, and a tip. A tip portion of the core extends completely through the portion of the cavity defining the tip of the airfoil. The core is restrained to prevent movement between the core and outer shell. Molten metal is introduced into the cavity and solidified to form an airfoil having at least one outer wall which defines an open tip and a hollow interior. A metallic tip cap is formed on the outer wall which substantially closes off the open tip. The tip cap may be formed by packing the airfoil with metallic powder; and laser sintering the exposed powder so as to form a tip cap which is metallurgically bonded to the outer wall. | 08-12-2010 |
Sudhir Kumar Tewari, West Chester, OH US
Patent application number | Description | Published |
---|---|---|
20100140236 | LASER MACHINING SYSTEM AND METHOD - A laser machining system comprises a laser configured to generate a laser output for forming a molten pool on a substrate, a nozzle configured to supply a growth material to the molten pool for depositing the material on the substrate, and an optical unit configured to capture a plurality of grayscale images comprising temperature data during the laser deposition process, wherein the grayscale images correspond to respective ones of a plurality of radiation beams with different desired wavelengths. Further, the laser machining system comprises an image-processing unit configured to process the grayscale images to retrieve the temperature data according to linear relationships between temperatures in the laser deposition process and the corresponding grayscales of the respective images. A laser machining method is also presented. | 06-10-2010 |
Swati Tewari, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20140244802 | METHOD AND SYSTEM FOR EMBEDDING IDENTIFIED USER INFORMATION INTO SOFTWARE - A method and system comprises communicating, to a server, a signal initiated by a user actuation. The signal comprises at least the user's identifying information and location information. The server receives the signal and dynamically tags an executable computer code with at least, in part, the received signal. The server further configures the tagged executable computer code using at least, in part, the received signal to form a user specific computer code. The server makes available the user specific computer code for the user. The user specific computer code is accessed and received to be executed and uniquely configured for the user during the execution without user intervention for configuration. | 08-28-2014 |
Tapan Tewari, Framingham, MA US
Patent application number | Description | Published |
---|---|---|
20110161284 | WORKFLOW SYSTEMS AND METHODS FOR FACILITATING RESOLUTION OF DATA INTEGRATION CONFLICTS - Exemplary data management, data integration, and workflow systems and methods are disclosed. An exemplary method includes a data integration subsystem maintaining data representative of a set of one or more workflow rules configured for use by a workflow engine within the data integration subsystem to screen one or more data integration conflicts for workflow processing based on the set of one or more workflow rules and generate one or more workflow tasks for the screened one or more data integration conflicts based on the set of one or more workflow rules, receiving user input requesting an update to the set of one or more workflow rules, and dynamically updating, during a runtime of the workflow engine, the data representative of the set of one or more workflow rules to reflect the update. Corresponding systems and methods are also disclosed. | 06-30-2011 |
Vijay Tewari, Portland, OR US
Patent application number | Description | Published |
---|---|---|
20080276235 | VIRTUAL MACHINE MANAGEMENT USING PROCESSOR STATE INFORMATION - A method, system, and apparatus are provided for virtual machine management. According to one embodiment, processor state information associated with a processor is evaluated, and the processor state information is used to manage one or more virtual machines. | 11-06-2008 |
20150067683 | VIRTUAL ENVIRONMENT MANAGER - A virtual environment manager (“VEM”) simplifies the usability of virtual machines and provides users with an enhanced design for creating and/or for managing virtual machines (“VMs”). For example, a user can select description information and management information to be included in descriptors and according to which a VEM will create and manage various VM environments for various host environments. The VEM automatically creates the VM environments and host environments by sending descriptor description information and data files associated with the description information to virtual machine monitors (VMMs), which create the VM environments according to the description information. A VEM at each host may manage VM environments executed by the VMM, according to the descriptor management information. Thus, a set of descriptors to create and manage a set of VMs for a home computer may be easily modified by a user to create and manage a set of VMs for a work or laptop computer. | 03-05-2015 |
20150067684 | VIRTUAL ENVIRONMENT MANAGER - A virtual environment manager (“VEM”) simplifies the usability of virtual machines and provides users with an enhanced design for creating and/or for managing virtual machines (“VMs”). For example, a user can select description information and management information to be included in descriptors and according to which a VEM will create and manage various VM environments for various host environments. The VEM automatically creates the VM environments and host environments by sending descriptor description information and data files associated with the description information to virtual machine monitors (VMMs), which create the VM environments according to the description information. A VEM at each host may manage VM environments executed by the VMM, according to the descriptor management information. Thus, a set of descriptors to create and manage a set of VMs for a home computer may be easily modified by a user to create and manage a set of VMs for a work or laptop computer. | 03-05-2015 |
20150074663 | VIRTUAL ENVIRONMENT MANAGER - A virtual environment manager (“VEM”) simplifies the usability of virtual machines and provides users with an enhanced design for creating and/or for managing virtual machines (“VMs”). For example, a user can select description information and management information to be included in descriptors and according to which a VEM will create and manage various VM environments for various host environments. The VEM automatically creates the VM environments and host environments by sending descriptor description information and data files associated with the description information to virtual machine monitors (VMMs), which create the VM environments according to the description information. A VEM at each host may manage VM environments executed by the VMM, according to the descriptor management information. Thus, a set of descriptors to create and manage a set of VMs for a home computer may be easily modified by a user to create and manage a set of VMs for a work or laptop computer. | 03-12-2015 |