Pendharkar
Mrudul Vinod Pendharkar, Tampere FI
Patent application number | Description | Published |
---|---|---|
20130159900 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR GRAPHICALLY ENHANCING THE USER INTERFACE OF A DEVICE - Provided herein is a method, apparatus and computer program product for of presenting a partial view of a representation of a full version of a program. In particular, the method may include providing for display of a plurality of tiles representing a plurality of programs, where a first tile of the plurality of tiles representing a first program includes a first partial view of a representation of a full version of the first program. The method may also include providing for display of an enlarged version of the first tile in response to a first input, where the enlarged version includes a second partial view of the representation of the full version of the first program which is larger than the first partial view. | 06-20-2013 |
Niranjan Pendharkar, Pune IN
Patent application number | Description | Published |
---|---|---|
20110082835 | PERIODIC FILE SYSTEM CHECKPOINT MANAGER - A periodic checkpoint method for a file system replication source. The method comprises generating a first checkpoint at a first time on a file system replication source and identifying a set of data objects from the replication source that have been modified during a time period between the first time and a subsequent second time. A periodic checkpoint is then generated at the second time on the file system replication source by using the set of data objects. | 04-07-2011 |
20110252067 | INSERT OPTIMIZATION FOR B+ TREE DATA STRUCTURE SCALABILITY - A method, in one embodiment, can include receiving a key and associated data via a computing device. Furthermore, the method can include searching a B+ tree data structure using the key to find a leaf node. The B+ tree data structure is stored by a persistent storage coupled to the computing device. The B+ tree data structure can include a first plurality of nodes that each contains a key-value entry that is not maintained in a sorted order based on its key. In addition, the key and associated data are appended to the leaf node. A sector that includes the leaf node and the key and associated data can be flushed to the persistent storage. | 10-13-2011 |
20110282834 | CONTINUOUS REPLICATION IN A DISTRIBUTED COMPUTER SYSTEM ENVIRONMENT - A method for implementing continuous data replication in a distributed computer system. The method includes receiving a forwarded data object write I/O from a data server. The method further includes examining attribute information of the data object to determine a consistency group for the data object. A replication policy is examined in view of the consistency group of the data object to determine a destination redundancy server. The data object write I/O is forwarded to the destination redundancy server for storage. An acknowledgment is then sent to the data server upon storage of the data object in the destination redundancy server. | 11-17-2011 |
20120036106 | Data Replication Techniques Using Incremental Checkpoints - Incremental checkpoint, for use in data replication, track the changes made to a file system after a point in time at which the incremental checkpoint is created. Data replication techniques using the incremental checkpoints may include taking a regular checkpoint of the file system and creating the first time full copy on remote node using the regular checkpoint. Changes made to the file system are then tracked in an incremental checkpoint that are stored on the remote node. The processes of taking the incremental checkpoint and storing the incremental checkpoint are iteratively performed. The first time fully copy and the incremental checkpoints may then be used for data replication, backup, continuous data protection (CDP), or the like. | 02-09-2012 |
20120042125 | Systems and Methods for Efficient Sequential Logging on Caching-Enabled Storage Devices - A computer-implemented method for efficient sequential logging on caching-enabled storage devices may include 1) identifying a storage device with a cache, 2) allocating space on the storage device for a sequential log, 3) calculating a target size for the sequential log based at least in part on an input/output load directed to the sequential log, and then 4) restricting the sequential log to a portion of the allocated space corresponding to the target size. Various other methods, systems, and computer-readable media are also disclosed. | 02-16-2012 |
20120072393 | SELECTIVE VIRTUAL MACHINE IMAGE REPLICATION SYSTEMS AND METHODS - Systems and methods for fault handling are presented. In one embodiment, a fault handling method includes: performing an information collection process, wherein the information collection process includes collecting information regarding guest operating system files of a virtual machine; performing a selective replication region identification process, wherein the selective replication region identification process includes identifying regions associated with a selective amount of the guest operating system files; and performing a replication process based upon result of the replication region identification process. In one embodiment, the selective replication region identification process includes identifying regions associated with files of interest. The selective replication region identification process can include identifying regions associated with temporary files. The information regarding files can include a list of regions used by the files after loopback mounting of a virtual disk file, a list of regions which have been modified on the virtual disk file and regions associated with metadata that has changed. | 03-22-2012 |
20120158659 | HOST BASED SOFTWARE BLOCK LEVEL REPLICATION USING METADATA INDICATING CHANGED DATA OBJECTS AT SOURCE AND SECONDARY NODES - A host-based replication snapshot method. The method includes synchronizing a set of data objects stored at both a replication source node and a secondary node. The method further includes identifying changed data objects out of the set of data objects from the replication source node that have been modified during a time period between a first time and a subsequent second time. Metadata indicating the changed data objects from the replication source node is transmitted to the secondary node. A snapshot is then generated at the second time on the secondary node by using the metadata. | 06-21-2012 |
20130024432 | METHOD AND SYSTEM FOR STORING DATA IN COMPLIANCE WITH A COMPRESSION HANDLING INSTRUCTION - A method for storing data in a storage system. In one embodiment, implementation of a method for storing data in compliance with a compression handling instruction includes: at a storage controller, receiving an object for storage within a data storage, wherein the object is in an original state; determining whether a compression handling instruction is received in association with the object; and executing the compression handling instruction when storing the object. | 01-24-2013 |
20130205006 | INTELLIGENT FAILOVER OR SHUTDOWN OF AN APPLICATION USING INPUT/OUTPUT SHIPPING IN RESPONSE TO LOSS OF CONNECTIVITY TO DATA STORAGE IN A CLUSTER - When a loss of connectivity between a first node in a cluster of nodes and a data store is detected, an input/output (I/O) request associated with an application that was executing on the first node is shipped to a second node in the cluster that is in communication with the data store. The application can be gracefully shut down on the first node, and the second node can execute the application and satisfy the I/O request. | 08-08-2013 |
20130246666 | SHARED STORAGE ACCESS MANAGEMENT SYSTEMS AND METHODS - Shared storage access management systems and methods are presented. A method can comprise: performing an endpoint I/O source authority tracking process in which permission of an endpoint I/O source to perform an I/O with at least a portion of an endpoint storage target is tracked at least in part based on a corresponding endpoint I/O source ID value, and performing an I/O operation based upon results of the endpoint I/O source authority tracking process. In one embodiment, the endpoint I/O source ID value is associated with an endpoint I/O source that is a virtual machine. The endpoint I/O source ID value can be unique and can be bound to an endpoint I/O source. In one exemplary implementation, the endpoint I/O source ID value does not depend upon intermediate communication channel characteristics between a corresponding endpoint I/O source and endpoint storage target. | 09-19-2013 |
20130275653 | MULTI-TIER STORAGE USING MULTIPLE FILE SETS - Storage locations in a first tier of a multi-tier storage system are allocated to a first set of data structures (e.g., inodes) in a first file set. A file that is stored in the first tier is associated with a first data structure of the first set. In response to determining that data in the file should be moved to a second tier of the multi-tier storage system, the file is associated with a second data structure in a second file set. The second data structure is allocated a storage location in the second tier. Consequently, two data structures are associated with the file. The data is copied from the first tier to the storage location in the second tier, and can be subsequently accessed using the second data structure. | 10-17-2013 |
20130346724 | SEQUENTIAL BLOCK ALLOCATION IN A MEMORY - A region of memory is logically divided into a number of segments, each of which is logically divided into a number of blocks. Blocks are allocated sequentially. A head pointer and a tail pointer demarcate the section of allocated blocks. As allocated blocks are added, the tail pointer is moved so that it remains at the end of the section of allocated blocks. If the tail pointer is within a threshold distance of the head pointer, then the head pointer is moved from its current position to a new position, and the allocated blocks between the current and new positions are freed (deallocated and/or erased). Thus, writes to the memory can be performed sequentially, and blocks can be freed in advance of when they are actually needed. | 12-26-2013 |
20140281273 | Providing Local Cache Coherency in a Shared Storage Environment - Multiple nodes of a cluster have associated non-shared, local caches, used to cache shared storage content. Each local cache is accessible only to the node with which it is associated, whereas the cluster-level shared storage is accessible by any of the nodes. Attempts to access the shared storage by the nodes of the cluster are monitored. Information is tracked concerning the current statuses of the local caches of the nodes of the cluster. Current tracked local cache status information is maintained, and stored such that it is accessible by the multiple nodes of the cluster. The current tracked local cache status information is used in conjunction with the caching functionality to determine whether specific nodes of the cluster are to access their local caches or the shared storage to obtain data corresponding to specific regions of the shared storage. | 09-18-2014 |
20150269067 | SYSTEMS AND METHODS FOR IDENTIFYING ACCESS RATE BOUNDARIES OF WORKLOADS - A computer-implemented method for identifying access rate boundaries of workloads may include (1) tracking the number of times each region of data within a plurality of regions of data is accessed during a period of time, (2) creating an ordered list of each region of data from the plurality of regions of data, (3) calculating one or more drops in access rates between two or more regions of data in the ordered list, (4) determining that a calculated access-rate drop from a first region of data to a second region of data exceeds a predefined threshold, and (5) calculating a boundary access rate for a workload of data. Various other methods, systems, and computer-readable media are also disclosed. | 09-24-2015 |
Niranjan Pendharkar, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20150031408 | System and Methods for Controlling Transmit Power on Multi-SIM Devices in Compliance with Specific Absorption Rate Limits - Methods and devices are disclosed for control total transmit power within specific absorption rate (SAR) limits when a multi-SIM wireless device, such as a dual-SIM dual active (DSDA) device, has two active data communications. Embodiment methods include determining a priority of at least one of two active data communications based upon a measured condition of the wireless device, and reducing transmit power on one of the two RF resources supporting one of the two active data communications with lower priority. To identify a higher or lower priority active data communication, characteristics of the communications or data may be used. | 01-29-2015 |
Niranjan Pendharkar, Ncl IN
Patent application number | Description | Published |
---|---|---|
20110208931 | Systems and Methods for Enabling Replication Targets to Reclaim Unused Storage Space on Thin-Provisioned Storage Systems - A computer-implemented method for enabling replication targets to reclaim unused storage space on thin-provisioned storage systems may include: 1) replicating data from a replication source to a replication target, 2) identifying unused storage space within the replicated data, 3) generating a reclamation request for reclaiming the unused storage space from a thin-provisioned storage system that provides thin-provisioned storage for the replication target, and then 4) issuing the reclamation request to the thin-provisioned storage system in order to reclaim the unused storage space from the thin-provisioned storage system. Various other related systems, methods, and configured computer-readable media are also disclosed. | 08-25-2011 |
Niranjan Ramesh Pendharkar, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20150103812 | METHODS AND APPARATUS FOR WiFi QUALITY ESTIMATION BASED ON BASIC SERVICE SET LOAD AND WIDE AREA NETWORK METRICS - Methods, systems, and devices are described for determining a quality estimation of a wireless network that may be used to determine whether a particular wireless network meets one or more criteria for association with a station. The quality estimation may be based on a load quality of a basic service set (BSS) of an available wireless network and/or one or more wide area network (WAN) metrics associated with the wireless network. A station may evaluate such load quality and WAN metrics prior to association, and/or after association with a wireless network. | 04-16-2015 |
20150215184 | DETERMINATION OF END-TO-END TRANSPORT QUALITY - Methods, systems, and devices are described for assessing the quality of end-to-end connectivity for a wireless communication device. Data generated from at least one of existing traffic and networking operations caused by existing traffic of the wireless communication device may be monitored to obtain information related to connectivity quality. One or more values of one or more metrics may be determined using the obtained information. The quality of end-to-end connectivity for the wireless communication device may be assessed using the value(s) of the metric(s). Based at least in part on a result of the assessment, an action may be performed to improve connectivity quality for the wireless communication. | 07-30-2015 |
Sameer Pendharkar, Dallas, TX US
Patent application number | Description | Published |
---|---|---|
20090068804 | DRAIN EXTENDED PMOS TRANSISTORS AND METHODS FOR MAKING THE SAME - Semiconductor devices ( | 03-12-2009 |
20150103451 | BI-DIRECTIONAL ESD PROTECTION CIRCUIT - An electrostatic discharge (ESD) device for protecting an input/output terminal of a circuit, the device comprising a first transistor with an integrated silicon-controlled rectifier (SCR) coupled between the input/output (I/O) terminal of the circuit and a node and a second transistor with an integrated silicon-controlled rectifier coupled between the node and a negative terminal of a supply voltage, wherein the silicon-controlled rectifier of the first transistor triggers in response to a negative ESD voltage and the silicon-controlled rectifier of the second transistor triggers in response to a positive ESD voltage. | 04-16-2015 |
Sameer Pendharkar, Richardson, TX US
Patent application number | Description | Published |
---|---|---|
20090124068 | Non-Uniformly Doped High Voltage Drain-Extended Transistor and Method of Manufacture Thereof - The present invention provides, in one embodiment, a transistor ( | 05-14-2009 |
Sameer Prakash Pendharkar, Allen, TX US
Patent application number | Description | Published |
---|---|---|
20090194838 | COSI2 SCHOTTKY DIODE INTEGRATION IN BISMOS PROCESS - Cobalt silicide (CoSi2) Schottky diodes fabricated per the current art suffer from excess leakage currents in reverse bias. In this invention, an floating p-type region encircles each anode of a CoSi2 Schottky diode comprising of one or more CoSi2 anodes. The resulting p-n junction forms a depletion region under the Schottky junction that reduces leakage current through the Schottky diodes in reverse bias operation. | 08-06-2009 |
20100117150 | METHODS OF MANUFACTURING TRENCH ISOLATED DRAIN EXTENDED MOS (DEMOS) TRANSISTORS AND INTEGRATED CIRCUITS THEREFROM - A method of fabricating an integrated circuit (IC) including at least one drain extended MOS (DEMOS) transistor and ICs therefrom includes providing a substrate having a semiconductor surface, the semiconductor surface including at least a first surface region that provides a first dopant type. A patterned masking layer is formed on the first surface region, wherein at least one aperture in the masking layer is defined. The first surface region is etched to form at least one trench region corresponding to a position of the aperture. A dopant of a first dopant type is implanted to raise a concentration of the first dopant type in a first dopant type drift region located below the trench region. After the implanting, the trench region is filled with a dielectric fill material. A body region is then formed having a second dopant type in a portion of the first surface region. A gate dielectric is then formed over a surface of the body region and the first surface region. A patterned gate electrode layer is formed over the gate dielectric, a source region in the body region and a drain region in the first surface region on a side of the trench region opposite to the source are formed, and fabrication of the IC is completed. | 05-13-2010 |
20110186933 | SCHOTTKY DIODE WITH SILICIDE ANODE AND ANODE-ENCIRCLING P-TYPE DOPED REGION - An integrated circuit includes a Schottky diode having a cathode defined by an n-type semiconductor region, an anode defined by a cobalt silicide region, and a p-type region laterally annularly encircling the cobalt silicide region. The resulting p-n junction forms a depletion region under the Schottky junction that reduces leakage current through the Schottky diodes in reverse bias operation. An n+-type contact region is laterally separated by the p-type region from the first silicide region and a second cobalt silicide region is formed in the n-type contact region. The silicided regions are defined by openings in a silicon blocking dielectric layer. Dielectric material is left over the p-type region. The p-type region may be formed simultaneously with source/drain regions of a PMOS transistor. | 08-04-2011 |
Sandeep Pendharkar, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130326275 | HARDWARE PLATFORM VALIDATION - A system for validating a hardware platform is provided. The system includes a database that stores one or more test specifications, a compiler that generates a target image based on (i) a device driver obtained from a device driver generator, (ii) a platform independent target application code, (iii) a kernel source, and (iv) a run time environment, and a software driven validation generator that analyses the run time specification and the device programming specification and generates (i) one or more test cases based on (a) the one or more test specifications, and (b) the device programming specification, and (ii) a control software based on the test cases. The test cases include configurations that are specific to the hardware platform. The hardware platform is validated based on (i) an execution of the target image and the control software on the hardware platform, and (ii) the one or more test cases. | 12-05-2013 |
20150089515 | SYSTEM AND METHOD FOR GENERATING A DEVICE DRIVER USING AN ARCHIVE OF TEMPLATE CODE - A system for generating a device driver based on an archived template code using a device driver generation tool is provided. The device driver generation tool is configured to extract configuration files and template files from a template archive stored in a database, each of the files comprises high level configuration files and low level configuration files, each comprising one or more labels, parse a high-level configuration file, corresponding to a class of a device, and an operating system for which the driver is being generated, process a label from the high-level configuration file, extract template code from the template files to obtain an extracted template code, and generate a portion of the driver based on the extracted template code when a block label is identified, parse a low-level configuration file, and generate the driver using a first specification and a second specification when the label is a file label. | 03-26-2015 |
Sandeep Pendharkar, Bengaluru IN
Patent application number | Description | Published |
---|---|---|
20150278231 | SYSTEM AND METHOD FOR CUSTOMIZING ARCHIVE OF A DEVICE DRIVER GENERATOR TOOL FOR A USER - A system and a processor implemented method for customizing an archive of a device driver generator tool for a user is provided. The system includes (i) a memory unit that stores a database, and a set of modules, and (ii) a processor. The template file obtaining module is configured to obtain information associated with the template files and template files. The configuration file obtaining module is configured to obtain information associated with the configuration files and configuration files. The archive configuration file verification module is configured to verify whether an archive for the configuration files and the template files is pre-existing in the database. The archive file appending module is configured to (i) append the template files and the configuration files to the archive pre-existing in the database. The archive file appending module generates the archive for template files and configuration files upon the archive not pre-existing in the database. | 10-01-2015 |
Sanyog M. Pendharkar, Edison, NJ US
Patent application number | Description | Published |
---|---|---|
20110027378 | PROCESS OF MAKING FLOWABLE HEMOSTATIC COMPOSITIONS AND DEVICES CONTAINING SUCH COMPOSITIONS - The present invention includes both sterilized and unsterilized hemostatic compositions that contain a continuous, biocompatible liquid phase having a solid phase of particles of a biocompatible polymer suitable for use in hemostasis and which is substantially insoluble in the liquid phase, and a discontinuous, biocompatible gaseous phase, each of which is substantially homogenously dispersed throughout the continuous liquid phase, methods for making such compositions, medical devices that contain sterilized hemostatic compositions disposed therein and methods of making such devices. | 02-03-2011 |
Sanyog M. Pendharkar, Anandnagar IN
Patent application number | Description | Published |
---|---|---|
20100183582 | HEMOSTATIC COMPOSITIONS CONTAINING STERILE THROMBIN - The present invention includes sterilized hemostatic compositions that contain a continuous, biocompatible liquid phase having a solid phase of particles of a biocompatible polymer suitable for use in hemostasis and that is substantially insoluble in the liquid phase, and sterile thrombin, each of which is substantially homogenously dispersed throughout the continuous liquid phase, and methods for making such compositions. | 07-22-2010 |
Sanyog Manohar Pendharkar, Edison, NJ US
Patent application number | Description | Published |
---|---|---|
20090246238 | REINFORCED ABSORBABLE MULTILAYERED HEMOSTATIC WOUND DRESSING - The present invention is directed to a reinforced absorbable multilayered hemostatic wound dressing comprising a first absorbable nonwoven fabric, a second absorbable woven or knitted fabric, thrombin and/or fibrinogen. | 10-01-2009 |
20130136781 | REINFORCED ABSORBABLE MULTILAYERED HEMOSTATIC WOUND DRESSING - The present invention is directed to a reinforced absorbable multilayered hemostatic wound dressing comprising a first absorbable nonwoven fabric, a second absorbable woven or knitted fabric, thrombin and/or fibrinogen. | 05-30-2013 |
Vishal Vikas Pendharkar, Singapore SG
Patent application number | Description | Published |
---|---|---|
20110028510 | Compositions, Methods, and Kits for Treating Influenza Viral Infections - The present invention provides compositions, methods, and kits for treating or preventing a viral infection (e.g., an infection caused by an influenza virus). | 02-03-2011 |
20110201665 | Compositions, Methods, and Kits for Treating Influenza Viral Infections - The present invention provides compositions, methods, and kits for treating or preventing a viral infection (e.g., an infection caused by an influenza virus). | 08-18-2011 |
Vivek S. Pendharkar, Los Altos Hills, CA US
Patent application number | Description | Published |
---|---|---|
20140019224 | FACILITATING CONSUMER ACTIVITY THROUGH AN ELECTRONIC CARD DEVICE - An electronic card device includes a Radio Frequency (RF) circuit configured to receive information from a remote broadcast transmitter, a memory associated with the RF circuit to store a unique identifier of the electronic card device, and a processor communicatively coupled to the memory. The processor is configured to enable reception of the information from the remote broadcast transmitter based on the unique identifier of the electronic card device in the memory to generate data configured to facilitate consumer activity on part of a user of the electronic card device through the electronic card device. Also, the electronic card device includes a display unit integrated therewith configured to display output data related to the data generated through the processor. | 01-16-2014 |