Marathe
Amey V. Marathe, Pune IN
Patent application number | Description | Published |
---|---|---|
20150267803 | LUBRICATION OF POWER TRAIN COMPONENTS - A lubrication apparatus for lubrication of one or more components is described. The apparatus may include a housing with an internal housing cavity containing lubrication fluid. A catchment feature may be located on an internal portion of the housing, the catchment feature having a lip and a reservoir, with the lip extending into the internal housing cavity above, at least in part, a lubrication fluid sump level of the internal housing cavity. A first lubrication passage may extend from the catchment feature into the housing. The lip and the reservoir of the catchment feature may catch lubrication fluid splashed above the lubrication fluid sump level. The first lubrication passage may direct lubrication fluid from the catchment feature to the one or more components. | 09-24-2015 |
Anant Madhavrao Marathe, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20090062511 | PROCESS FOR THE PREPARATION OF BIVALIRUDIN AND ITS PHARMACEUTICAL COMPOSITIONS - The present application provides an improved process for the preparation of Bivalirudin and its pharmaceutical compositions. | 03-05-2009 |
20100130734 | PROCESS FOR PREPARING CAPECITABINE - There is provided processes for the preparation of capecitabine and intermediates thereof. | 05-27-2010 |
Bhupesh Marathe, Mumbai IN
Patent application number | Description | Published |
---|---|---|
20130216832 | Heat Reflective Dry-Mix/Paint - Heat reflective dry mix comprising of dry particulate, the said dry particulate matter comprising of pigment in the range of 20 to 45%, the balance proportion being extenders/fillers wherein the extenders/fillers shall consist of calcium carbonate not less than 15% with respect to total particulate matter having the average particle size of the dry particulate matter in the range of 2 to 6 micrometers. | 08-22-2013 |
Chandan A. Marathe, Lalitha Srinivasa Nilaya IN
Patent application number | Description | Published |
---|---|---|
20120265932 | METHOD TO INCREASE THE FLEXIBILITY OF CONFIGURATION AND/OR I/O PERFORMANCE ON A DRIVE ARRAY BY CREATION OF RAID VOLUME IN A HETEROGENEOUS MODE - An apparatus comprising a controller and a plurality of storage drives. The controller may be configured to generate a control signal in response to one or more input/output requests. The plurality of storage drives may be arranged as one or more volumes. Each of the volumes may comprise a plurality of drive groups. Each of the drive groups may comprise a particular type of storage drive. The controller may be configured to form the volume across drives from two or more of the groups. | 10-18-2012 |
Chandan A. Marathe, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120233604 | METHOD FOR CONCURRENTLY SUPPORTING NEW AND LEGACY THIRD PARTY BOOT-SETS IN AN ARRAY - A method for updating software in a controller, comprising the steps of (A) comparing a current boot-set to a host boot-set to determine if a new boot-set is needed, (B) determining if one or more specifications of a new boot-set are met and (C) updating the controller to the new boot-set. An agent may control the controller during the updating to allow the controller to process data requests during the updating. | 09-13-2012 |
20120272298 | METHOD TO PROVIDE CHIP BASED SECURITY FOR I/O PACKETS IN AN ARRAY USING DYNAMIC TOPOLOGY - An apparatus comprising a controller circuit and an array. The controller circuit may be configured to read/write data in response to one or more input/output requests. The array may be configured to present/receive data to/from the controller circuit in response to the input/output requests. The data may be only transmitted to/from the array after a successful authentication between (i) a first code embedded within each of the input/output requests and (ii) a second code stored on a non-volatile memory within the controller circuit. | 10-25-2012 |
20120331222 | METHOD TO IMPROVE THE PERFORMANCE OF A READ AHEAD CACHE PROCESS IN A STORAGE ARRAY - An apparatus comprising an array controller and a cache. The array controller may be configured to read/write data to a first array of drives of a first drive type in response to one or more input/output requests. The cache may be configured to (i) receive said input/output requests from the array controller, (ii) temporarily store the input/output requests, and (iii) read/write data to a second array of drives of a second drive type in response to the input/output requests. The first array of drives may be configured to copy the data directly to/from the second array of drives during a cache miss condition such that the array controller retrieves the data stored in the first array of drives through the second array of drives without writing the data to the cache. | 12-27-2012 |
Devdutt Marathe, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20100290602 | METHOD AND SYSTEM FOR CUSTOMIZING RING-BACK TONE IN AN INTER-OPERATOR TELECOMMUNICATION SYSTEM - A method and a system for providing commercial information (CI) messages as a ring-back tone (RBT) to a caller in an inter-operator telecommunication system are provided. In the inter-operator telecommunication system, the caller and the callee are registered to different telecommunication service providers. The second telecommunication service provider sends a request to the first telecommunication service provider to provide a CI id associated with a caller profile of the caller. The request is routed through a global broker. An RBT player of the second telecommunication service provider plays the CI message corresponding to the CI id as ring-back tone to the caller. | 11-18-2010 |
Girish Marathe, Mumbai IN
Patent application number | Description | Published |
---|---|---|
20140012590 | System and Method for Inter-Relating Multiple Data Types - A system and method of inter-relating multiple data types to provide a comprehensive data output reflecting non-retail sales of pharmaceuticals is disclosed. In particular, the system and method of the present invention provides for receiving non-retail pharmaceutical delivery information of pharmaceuticals deliver to outlets from manufacturers or distributors, where the data is primarily inconsistent and features many voids ( | 01-09-2014 |
Nandan Marathe, Waldorf DE
Patent application number | Description | Published |
---|---|---|
20150186550 | Append-Only B-Tree Cursor - Existing algorithms to build balanced tree structures (“b-trees”) compare a data element (e.g., a key) to be inserted with the data elements that have already been inserted to find the correct position to insert the data element. Additionally, the algorithms balance and/or rebalance the b-tree when any individual node gets over-filled. As part of this balancing, data elements stored in the various nodes are moved to other nodes. These operations can incur both time and resource costs. We propose an algorithm to build a b-tree in a bottom up manner and a technique to modify trees built using the aforementioned algorithm so that they are balanced. We also propose a method to allow for adding more data into the thus-built b-tree as long as it follows a certain set of pre-conditions. | 07-02-2015 |
Nandan Marathe, Pune IN
Patent application number | Description | Published |
---|---|---|
20150186453 | Tiered index management - Disclosed herein are methods for retrieving data from a database. An embodiment operates searching for a key in a first index. The method determines that the searching will require a storage access request and issues the storage access request. The method continues searching for the key in a second index. | 07-02-2015 |
20150186549 | Tiered Index Management - Disclosed herein are system, method, and computer program product embodiments for storing data in a database using a tiered index architecture, An embodiment operates by creating a first tier and assigning a first threshold size to the first tier. When the first tier exceed the first threshold size, the system pushes data from the first tier into a second tier. | 07-02-2015 |
20150199391 | Append-Only B-Tree Cursor - Existing algorithms to build balanced tree structures (“b-trees”) compare a data element. (e.g., a key) to be inserted with the data elements that have already been inserted to find the correct position to insert the data element. Additionally, the algorithms balance and/or rebalance the b-tree when any individual node gets over-filled. As part of this balancing, data elements stored in the various nodes are moved to other nodes. These operations can incur both time and resource costs. We propose an algorithm to build a b-tree in a bottom up manner and a technique to modify trees built using the aforementioned algorithm so that they are balanced. We also propose a method to allow for adding more data into the thus-built b-tree as long as it follows a certain set of pre-conditions. | 07-16-2015 |
Nikhil Marathe, Pune IN
Patent application number | Description | Published |
---|---|---|
20110225199 | METHOD AND SYSTEM FOR IDENTIFICATION OF DATA OWNER IN AN UNSTRUCTURED DATA ENVIRONMENT - A system and method of identifying a data owner examining a plurality of criterion including access type, number of accesses at a given time and over the period of time selected, recentness of access, and permission levels of users. The method of file owner identification comprises collecting a plurality of samples including usage of a file by a plurality of users. A plurality of factors is calculated based on said plurality of users, wherein a respective factor is calculated for each of said plurality of users, wherein each factor is based on a plurality of use elements. Based on said plurality of factors, a file owner is determined of said file from among said plurality of users. The file owner may be communicated and/or displayed e.g., in a graph. | 09-15-2011 |
20120011161 | PERMISSION TRACKING SYSTEMS AND METHODS - Systems and methods for permission maintenance are presented. In one embodiment, a permission maintenance method includes: gathering permission indication information including permission indications associated with various stored information; analyzing the permission indication information including analyzing potential permission indication origination; and creating interface presentation information based upon results of the analyzing the permission indications, wherein the interface presentation information includes information related to potential origination of a permission indication. The gathering can include scanning a file system and collecting active directory information. The analyzing can include determining the type of access a principal is given to a file. The analyzing can also include determining if a principal is associated with a group and the type of permissions given to the group. In one exemplary implementation, the permission indication information is organized in accordance with potential permission indication origination. In one embodiment, the interface presentation information is presented in a Graphical User Interface, including a permission indicator and the information related to potential origination of the permission indicator. | 01-12-2012 |
Parag Arvind Marathe, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20140032169 | SYSTEMS AND METHODS FOR IMPROVING CONTROL SYSTEM RELIABILITY - In one embodiment, a system includes system includes a data collection system configured to collect a data from a control system. The system further includes a configuration management system configured to manage a hardware configuration and a software configuration for the control system based on the data. The system additionally includes a rule engine configured to use the data as input and to output a health assessment by using a rule database configured to store at least one rule, and a report generator configured to provide a health assessment for the control system. The system also includes a rule editor configured to create the at least one rule, update the at least one rule, delete the at least one rule, or a combination thereof. | 01-30-2014 |
20140172346 | SYSTEMS AND METHODS FOR PERFORMING REDUNDANCY TESTS ON TURBINE CONTROLS - A computing device for use in performing a redundancy test on a turbine assembly and a turbine control system including a plurality of controllers each configured to independently control operation of the turbine assembly is provided. The computing device configured to be coupled to the turbine control system and configured to determine whether a plurality of test conditions are satisfied, display to a user an indication of which test conditions are satisfied, and test, in response to a user input, the plurality of controllers. | 06-19-2014 |
Rahul Marathe, Pune IN
Patent application number | Description | Published |
---|---|---|
20150022433 | DISPLAY CONTROL IN A DATA PROCESSING DEVICE BASED ON SENSING DEVIATION THEREOF FROM A REFERENCE POSITION - A method includes sensing, through a processor of a data processing device in conjunction with a motion sensor, a deviation of the data processing device from a reference position thereof. The method also includes modifying, through the processor, a display parameter of a display unit of the data processing device and/or display data to be rendered on the display unit in accordance with the sensed deviation. | 01-22-2015 |
Rahul Ulhas Marathe, Pune IN
Patent application number | Description | Published |
---|---|---|
20140341530 | LEVERAGING AN EXISTING SENSOR OF A DATA PROCESSING DEVICE TO EFFECT A DISTANCE BASED DYNAMIC MODIFICATION OF A VIDEO FRAME PARAMETER - A method includes leveraging a sensor provided in a data processing device to estimate a distance between the data processing device and a user thereof, the data processing device and an object external to the data processing device and the user and/or the object and the user in conjunction with a processor of the data processing device communicatively coupled to a memory. The method also includes dynamically modifying, through the processor, a parameter of a video frame being played back on the data processing device, generated through the data processing device during capturing of a video of the object or captured through the data processing device during the capturing of the video of the object based on the estimated distance. | 11-20-2014 |
20140341532 | DISTANCE BASED DYNAMIC MODIFICATION OF A VIDEO FRAME PARAMETER IN A DATA PROCESSING DEVICE - A method includes receiving, through a processor of a data processing device communicatively coupled to a memory, data related to a distance between the data processing device and a user thereof, the data processing device and an object external to the data processing device and the user and/or the object and the user. The method also includes dynamically modifying, through the processor, a parameter of a video frame being: played back on the data processing device, generated through the data processing device during capturing of a video of the object or captured through the data processing device during the capturing of the video of the object based on the received data related to the distance. | 11-20-2014 |
20150081761 | DETERMINING FORMAT COMPATIBILITY ACROSS A DATA PROCESSING DEVICE AND ANOTHER DATA PROCESSING DEVICE PRIOR TO TRANSFER OF A MULTIMEDIA FILE THEREBETWEEN - A method includes executing an instance of a process on a data processing device and another data processing device, and setting up a Personal Area Network (PAN) through registering or pairing the another data processing device with the data processing device based on an identifier thereof. The method also includes initiating transfer of a multimedia file from the data processing device to the another data processing device through the instance of the process executing on the data processing device, and transmitting, metadata associated with the multimedia file from the data processing device to the another data processing device. Further, the method includes determining format compatibility of the multimedia file with the another data processing device thereat based on the metadata and a list of supported formats available in the another data processing device through a continued execution of the instance of the process on the another data processing device. | 03-19-2015 |
Shailesh Marathe, Pune IN
Patent application number | Description | Published |
---|---|---|
20110252067 | INSERT OPTIMIZATION FOR B+ TREE DATA STRUCTURE SCALABILITY - A method, in one embodiment, can include receiving a key and associated data via a computing device. Furthermore, the method can include searching a B+ tree data structure using the key to find a leaf node. The B+ tree data structure is stored by a persistent storage coupled to the computing device. The B+ tree data structure can include a first plurality of nodes that each contains a key-value entry that is not maintained in a sorted order based on its key. In addition, the key and associated data are appended to the leaf node. A sector that includes the leaf node and the key and associated data can be flushed to the persistent storage. | 10-13-2011 |
20120072766 | FAULT HANDLING SYSTEMS AND METHODS - Systems and methods for fault handling are presented. In one embodiment, a fault handling method includes: performing an error type detection process including determining if an error is a media error or a connectivity error; performing a detachment determination process to establish an appropriate detachment scenario, wherein the appropriate detachment scenario includes not detaching any mirrors if the connectivity error involves all mirrors; and returning an application write with a failure. In one embodiment, the detachment determination process detaches a mirror in accordance with results of a read-write-back process. In one exemplary implementation, the detachment determination process includes a connectivity status inquiry and mirrors are detached in accordance with results of the connectivity status inquiry. In one exemplary implementation, the connectivity status inquiry includes a SCSI connectivity inquiry. In one embodiment, consistency and synchronization is maintained between the mirrors by utilizing a read-write-back operation. | 03-22-2012 |
20120158659 | HOST BASED SOFTWARE BLOCK LEVEL REPLICATION USING METADATA INDICATING CHANGED DATA OBJECTS AT SOURCE AND SECONDARY NODES - A host-based replication snapshot method. The method includes synchronizing a set of data objects stored at both a replication source node and a secondary node. The method further includes identifying changed data objects out of the set of data objects from the replication source node that have been modified during a time period between a first time and a subsequent second time. Metadata indicating the changed data objects from the replication source node is transmitted to the secondary node. A snapshot is then generated at the second time on the secondary node by using the metadata. | 06-21-2012 |
20130205006 | INTELLIGENT FAILOVER OR SHUTDOWN OF AN APPLICATION USING INPUT/OUTPUT SHIPPING IN RESPONSE TO LOSS OF CONNECTIVITY TO DATA STORAGE IN A CLUSTER - When a loss of connectivity between a first node in a cluster of nodes and a data store is detected, an input/output (I/O) request associated with an application that was executing on the first node is shipped to a second node in the cluster that is in communication with the data store. The application can be gracefully shut down on the first node, and the second node can execute the application and satisfy the I/O request. | 08-08-2013 |
20140281273 | Providing Local Cache Coherency in a Shared Storage Environment - Multiple nodes of a cluster have associated non-shared, local caches, used to cache shared storage content. Each local cache is accessible only to the node with which it is associated, whereas the cluster-level shared storage is accessible by any of the nodes. Attempts to access the shared storage by the nodes of the cluster are monitored. Information is tracked concerning the current statuses of the local caches of the nodes of the cluster. Current tracked local cache status information is maintained, and stored such that it is accessible by the multiple nodes of the cluster. The current tracked local cache status information is used in conjunction with the caching functionality to determine whether specific nodes of the cluster are to access their local caches or the shared storage to obtain data corresponding to specific regions of the shared storage. | 09-18-2014 |
20150269067 | SYSTEMS AND METHODS FOR IDENTIFYING ACCESS RATE BOUNDARIES OF WORKLOADS - A computer-implemented method for identifying access rate boundaries of workloads may include (1) tracking the number of times each region of data within a plurality of regions of data is accessed during a period of time, (2) creating an ordered list of each region of data from the plurality of regions of data, (3) calculating one or more drops in access rates between two or more regions of data in the ordered list, (4) determining that a calculated access-rate drop from a first region of data to a second region of data exceeds a predefined threshold, and (5) calculating a boundary access rate for a workload of data. Various other methods, systems, and computer-readable media are also disclosed. | 09-24-2015 |
Shailesh Marathe, Maharashtra IN
Patent application number | Description | Published |
---|---|---|
20120042125 | Systems and Methods for Efficient Sequential Logging on Caching-Enabled Storage Devices - A computer-implemented method for efficient sequential logging on caching-enabled storage devices may include 1) identifying a storage device with a cache, 2) allocating space on the storage device for a sequential log, 3) calculating a target size for the sequential log based at least in part on an input/output load directed to the sequential log, and then 4) restricting the sequential log to a portion of the allocated space corresponding to the target size. Various other methods, systems, and computer-readable media are also disclosed. | 02-16-2012 |
Shailesh Vaman Marathe, Maharashtra IN
Patent application number | Description | Published |
---|---|---|
20110208931 | Systems and Methods for Enabling Replication Targets to Reclaim Unused Storage Space on Thin-Provisioned Storage Systems - A computer-implemented method for enabling replication targets to reclaim unused storage space on thin-provisioned storage systems may include: 1) replicating data from a replication source to a replication target, 2) identifying unused storage space within the replicated data, 3) generating a reclamation request for reclaiming the unused storage space from a thin-provisioned storage system that provides thin-provisioned storage for the replication target, and then 4) issuing the reclamation request to the thin-provisioned storage system in order to reclaim the unused storage space from the thin-provisioned storage system. Various other related systems, methods, and configured computer-readable media are also disclosed. | 08-25-2011 |
Shailesh Vaman Marathe, Pune IN
Patent application number | Description | Published |
---|---|---|
20110145818 | STORAGE VISIBILITY IN VIRTUAL ENVIRONMENTS - Embodiments of the present invention are directed to a method and system for making storage information available to virtual machines in virtual environments. A method includes sending a request, via an electronic system, for a plurality of storage attributes to a virtual storage access module. The virtual storage access module may facilitate access to storage for a virtual machine via a virtual access path. The method further includes receiving the plurality of storage attributes from the virtual storage access module and storing the plurality of storage attributes. In one embodiment, storing is operable to store the plurality of storage attributes such that they are available for use in storage management tasks. | 06-16-2011 |
20110202795 | DATA CORRUPTION PREVENTION DURING APPLICATION RESTART AND RECOVERY - Embodiments of the present invention are directed to a method and system for draining or aborting IO requests of a failed system prior to restarting or recovering an application in virtual environments. The method includes detecting, within an electronic system, an application error condition of an application executing on a virtual machine and determining an application restart target. The method further includes sending an input/output (IO) request drain command to a virtual IO server operable to provide storage to the virtual machine and receiving a signal that the IO requests have been drained. The drain command is operable to drain IO requests issued from the application. The application can then be restarted or recovered. | 08-18-2011 |