Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Shah, WA

Abhijeet S. Shah, Redmond, WA US

Patent application numberDescriptionPublished
20110271261MODIFIABLE HIGH-LEVEL INTERMEDIATE REPRESENTATION OF SOURCE CODE - A computer-implemented method includes compiling one or more segments of code during run-time of a process executing at one or more processors of a computer system. The compilation produces a high-level intermediate representation of the one or more segments of the code. The high-level intermediate representation is modifiable by the process, without executing the high-level intermediate representation, to generate a modified high-level intermediate representation that is executable by the process.11-03-2011
20110276953DYNAMIC TOKEN RESOLUTION DURING COMPILATION - A method includes, during compilation of a portion of source code at a compiler, initiating token resolution with respect to a token included in the portion of source code. A static context and a dynamic context of the compiler are queried to identify one or more lookup results of the token. A particular lookup result is selected to resolve the token based on one or more semantic rules of the compiler. The particular lookup result is selected independently of whether the particular lookup result is sourced from the static context or from the dynamic context. The method includes resolving the token based on the selected particular lookup result.11-10-2011

Abhishek Shah, Redmond, WA US

Patent application numberDescriptionPublished
20100251187LOCALIZED INFORMATION-PRESERVING LEVELS IN MODEL VISUALIZATION - Local areas of a visualized modeling language diagram are viewable at different levels of detail without losing information such as model elements and their connectivity. Multiple elements are associated with a group element, which has a visual portion derived from the appearance of a group member element. Connectors between group member elements and non-member elements are suppressed in favor of replacement connectors between the group element and the non-member element(s). The integrity of incoming and outgoing connections to the group is maintained relative to the rest of the model. Ungrouping elements restores the elements to their original state. Grouping can be applied locally to one or more parts of the visual model.09-30-2010

Ajey Pankaj Shah, Redmond, WA US

Patent application numberDescriptionPublished
20130061295Providing Status of Site Access Requests - Concepts and technologies are described herein for providing status of site access requests. In accordance with the concepts and technologies disclosed herein, a user attempts to access functionality of a server application that is limited to authorized users. In response to the access attempt, the server application determines if the user is authorized to access the functionality and if the user has previously requested access to the functionality. If the user has not previously requested access to the application, the server application can present a user interface to the user for requesting access to the server application. If the user has previously requested access to the application, the server application can present an indication that an access request already exists, history and status information associated with the access request, and/or an interface for submitting messages to the site owner or other entity.03-07-2013

Aniket A. Shah, Bellevue, WA US

Patent application numberDescriptionPublished
20090327784ENERGY MEASUREMENT TECHNIQUES FOR COMPUTING SYSTEMS - An energy measurement system (“EMS”) and techniques for correlating energy consumption to computing system activity. The EMS includes a data acquisition module, a processing module, and optionally a visualization module. The data acquisition module receives and transmits to the processing unit a number of sampled data streams, referred to as “data acquisition traces,” associated with a computing system under test (“SUT”). The processing module concurrently receives one or more system traces from the SUT, which are produced by particular components under examination by the EMS. Synchronization is established between the data acquisition traces and the system trace(s) when the SUT executes certain predetermined actions to produce data in both the data acquisition traces and the system trace(s), which data is used to logically align the traces. Then, as test scenarios are executed by the SUT, changes are monitored in the traces, and energy consumption is quantified.12-31-2009

Anil D. Shah, Renton, WA US

Patent application numberDescriptionPublished
20090321576Method and Apparatus for Detecting Conditons Conducive to Ice Formation - A method for detecting ambient conditions conducive to ice formation. The method includes the steps of measuring at least one parameter selected from a group of parameters consisting of a static pressure, a total pressure, a total temperature, a dew point temperature, and a liquid water content, and determining whether ambient conditions are conducive to ice formation based on the measured parameter.12-31-2009

Ankini Shah, Bellevue, WA US

Patent application numberDescriptionPublished
20110307798Merging Modifications to User Interface Components While Preserving User Customizations - An application displays a user interface (UI) component. A client can apply customizations to this UI component. After the client applies customizations to the UI component, the client modifies a solution set containing solutions that modify the UI component. After the client modifies the solution set, the application displays a new version of the UI component. Modifications provided by the solutions in the solution set are applied to the new version of the UI component. In addition, the customizations remain applied to the UI component without the client manually re-applying the customizations to the UI component.12-15-2011

Anup Shah, Seattle, WA US

Patent application numberDescriptionPublished
20110263967ULTRASOUND BASED METHOD AND APPARATUS FOR STONE DETECTION AND TO FACILITATE CLEARANCE THEREOF - Described herein are methods and apparatus for detecting stones by ultrasound, in which the ultrasound reflections from a stone are preferentially selected and accentuated relative to the ultrasound reflections from blood or tissue. Also described herein are methods and apparatus for applying pushing ultrasound to in vivo stones or other objects, to facilitate the removal of such in vivo objects.10-27-2011

Arpit S. Shah, Bellevue, WA US

Patent application numberDescriptionPublished
20120150885CHANGE NOTIFICATIONS FROM AN UPDATED DATA REPRESENTATION - An original representation of an original set of data in a data source can be provided, and an updated representation of an updated set of data in the data source can be received. A change notification set that includes change notifications can be generated by comparing the updated representation with the original representation. The change notification set can represent a possible set of changes that yield the updated representation when starting with the original representation. The change notification set can be sent to a client of the data source. One or more requests from the client for data from the data source may be processed while obtaining the updated representation of the updated set of data. This processing can include adding one or more placeholders and matching the placeholder(s) with one or more items in the updated set of data.06-14-2012
20120150886PLACEHOLDERS RETURNED FOR DATA REPRESENTATION ITEMS - One or more requests from a client for data representation items can be received by an items manager. The data representation items can represent data items in a data source. In response, the items manager can perform the following: generating placeholders corresponding to the data representation items; returning the placeholders to the client; fetching the data items from the data source; providing the data representation items to the client; and informing the client that the placeholders are to be replaced with the data representation items. The items manager may determine whether each data representation item can be synchronously returned to the client. If so, the items manager may return that data representation item synchronously, and may forego providing the client with a placeholder for that data representation item. This may allow a client to interact with a single interface for both synchronous and asynchronous data sources.06-14-2012
20120191747DATA ITEMS MANAGER - An items manager can request and receive data items from a data source via a data source adapter. The items manager can also maintain a list of data representation items representing data items. The data representation items can include user interface elements. Also, maintaining the list can include invoking a renderer to render the data representation items from the data items received from the data source, and including the data representation items in the list. The items manager can provide a client with an enumeration through the list of data representation items. The items manager may also provide other features, such as providing the client with notifications of changes to the list of data representation items.07-26-2012
20120296875OPTIMISTIC APPLICATION OF DATA EDITS - A data representation that represents source data at a data source can be maintained. A request to perform an edit can be received from a client, and a request to make the edit to the source data can be sent to the data source. The edit can be optimistically applied to the data representation. Additionally, a change notification can be sent to the client. The change notification can indicate one or more changes to the data representation, where the change(s) resulted from the application of the edit to the data representation. A notification can be received from the data source after applying the edit to the data representation and after sending the change notification. The notification from the data source can indicate whether the edit to the source data succeeded.11-22-2012

Ashish B. Shah, Sammamish, WA US

Patent application numberDescriptionPublished
20100100527FORGETTING ITEMS WITH KNOWLEDGE BASED SYNCHRONIZATION - Systems and methods that enable removal of data from an endpoint, while not propagating such removal to other endpoints when synchronizing data sources associated therewith. A designation component can indicate items as forgotten items, wherein such items are being known to an endpoint and deleted therefrom—yet, reintroduced therein and reappearing (e.g., as a create) upon re-synchronizing with the replica over again. Moreover, the forgotten items can employ additional metadata such as in from of an additional bit that indicates whether an item is a forgotten item.04-22-2010
20140250074FORGETTING ITEMS WITH KNOWLEDGE BASED SYNCHRONIZATION - Systems and methods that enable removal of data from an endpoint, while not propagating such removal to other endpoints when synchronizing data sources associated therewith. A designation component can indicate items as forgotten items, wherein such items are being known to an endpoint and deleted therefrom—yet, reintroduced therein and reappearing (e.g., as a create) upon re-synchronizing with the replica over again. Moreover, the forgotten items can employ additional metadata such as in from of an additional bit that indicates whether an item is a forgotten item.09-04-2014

Patent applications by Ashish B. Shah, Sammamish, WA US

Atul Kumar Shah, Sammamish, WA US

Patent application numberDescriptionPublished
20100262834ONE TIME PASSWORD KEY RING FOR MOBILE COMPUTING DEVICE - Single-use character combinations are a secure mechanism for user authentication. Such “one-time passwords” (OTPs) can be generated by a mobile device to which the user otherwise maintains easy access. A key exchange, such as in accordance with the Diffie-Hellman algorithm, can provide both the mobile device and a server with a shared secret from which the OTPs can be generated. The shared secret can be derived from parameters posted on the server and updated periodically, and the mobile device can obtain such parameters from the server before generating an OTP. Such parameters can also specify the type of OTP mechanism to be utilized. A second site can, independently, establish an OTP mechanism with the mobile device. For efficiency, the first server can provide an identity token which provides the mobile device's public key in a trusted manner, enabling more efficient generation of the shared secret with the second server.10-14-2010

Bhupendra Shah, Bonney Lake, WA US

Patent application numberDescriptionPublished
20100191860PERSONAL MEDIA BROADCASTING SYSTEM WITH OUTPUT BUFFER - A personal media broadcasting system enables video distribution over a computer network and allows a user to view and control media sources over a computer network from a remote location. A personal broadcaster receives an input from one or more types of media sources, digitizes and compresses the content, and streams the compressed media over a computer network to a media player running on any of a wide range of client devices for viewing the media. The system may allow the user to issue control commands (e.g., “channel up”) from the media player to the broadcaster, causing the source device to execute the commands. The broadcaster and the media player may employ several techniques for buffering, transmitting, and viewing the content to improve the user's experience.07-29-2010
20120011269PERSONAL MEDIA BROADCASTING SYSTEM WITH OUTPUT BUFFER - A personal media broadcasting system enables video distribution over a computer network and allows a user to view and control media sources over a computer network from a remote location. A personal broadcaster receives an input from one or more types of media sources, digitizes and compresses the content, and streams the compressed media over a computer network to a media player running on any of a wide range of client devices for viewing the media. The system may allow the user to issue control commands (e.g., “channel up”) from the media player to the broadcaster, causing the source device to execute the commands. The broadcaster and the media player may employ several techniques for buffering, transmitting, and viewing the content to improve the user's experience.01-12-2012
20130007816PERSONAL MEDIA BROADCASTING SYSTEM WITH OUTPUT BUFFER - A personal media broadcasting system enables video distribution over a computer network and allows a user to view and control media sources over a computer network from a remote location. A personal broadcaster receives an input from one or more types of media sources, digitizes and compresses the content, and streams the compressed media over a computer network to a media player running on any of a wide range of client devices for viewing the media. The system may allow the user to issue control commands (e.g., “channel up”) from the media player to the broadcaster, causing the source device to execute the commands. The broadcaster and the media player may employ several techniques for buffering, transmitting, and viewing the content to improve the user's experience.01-03-2013

Patent applications by Bhupendra Shah, Bonney Lake, WA US

Bhupendra Shah, Booney Lake, WA US

Patent application numberDescriptionPublished
20110185393FAST-START STREAMING AND BUFFERING OF STREAMING CONTENT FOR PERSONAL MEDIA PLAYER - Systems and methods allow playback of a media stream received via a network. The media stream is received and stored in a buffer prior to playback. Responsive to receiving the user command to change the content of the media stream, the buffer is flushed prior to receiving the changed content in the media stream.07-28-2011

Bhupendra Natwerlan Shah, Bonney Lake, WA US

Patent application numberDescriptionPublished
20110055864SYSTEMS AND METHODS FOR TRANSCODING AND PLACE SHIFTING MEDIA CONTENT - A set-top box (STB), digital video recorder (DVR), video player or other host device receives and interacts with a transcode module to provide enhanced transcoding capabilities that may be useful in placeshifting or other applications. The transcode module includes a host interface that couples to and communicates with the host device. The transcode module also includes a processor that receives an encrypted media stream from the host device via the bus interface, decrypts the encrypted media stream, transcodes the encrypted media stream to a different format, re-encrypts the transcoded stream, and provides the re-encrypted media stream to the host device via the host interface. The transcoded media content may be placeshifted to a remote player, stored at the host, or used for any other purpose.03-03-2011

Burt Shah, Renton, WA US

Patent application numberDescriptionPublished
20080286451GELLED SOLVENT COMPOSITION AND METHOD FOR RESTORING EPOXY GRAPHITE COMPOSITE MATERIALS - A process using environmentally friendly materials for restoring a surface of an epoxy graphite composite material that has been degraded by exposure to ultraviolet radiation. An example process includes steps of providing a gelled solvent composition, applying the gelled solvent composition to a degraded surface of an epoxy graphite composite material, and thereafter removing the gelled solvent composition to produce a restored surface. The process uses a novel gelled solvent composition comprising one or more non-halogenated organic solvents, a thickening agent, an abrasive agent, and water; wherein the gelled solvent composition has an evaporative weight loss that is lower than the evaporative weight loss of the one or more non-halogenated solvents.11-20-2008

Gunjan A. Shah, Redmond, WA US

Patent application numberDescriptionPublished
20120139929CONTROLLING RUNTIME EXECUTION FROM A HOST TO CONSERVE RESOURCES - A runtime management system is described herein that allows a hosting layer to dynamically control an underlying runtime to selectively turn on and off various subsystems of the runtime to save power and extend battery life of devices on which the system operates. The hosting layer has information about usage of the runtime that is not available within the runtime, and can do a more effective job of disabling parts of the runtime that will not be needed without negatively affecting application performance or device responsiveness. The runtime management system includes a protocol of communication between arbitrary hosts and underlying platforms to expose a set of options to allow the host to selectively turn parts of a runtime on and off depending on varying environmental pressures. Thus, the runtime management system provides more effective use of potentially scarce power resources available on mobile platforms.06-07-2012
20120144333RENDER TRANSFORM BASED SCROLLING AND PANNING FOR SMOOTH EFFECTS - An information display system is described herein that separates rendering of information from receiving that information so that the rendering portion can be quickly displayed to the user and the data can arrive as it is available to provide further detail. The rendering portion creates a hardware surface measured to fill the area to be consumed by the list box or other control. Independently, the information retrieval portion queries information from a server or other source and processes the information as it is received. The system can then perform a transformation on the previously created hardware surface to insert the information in the rendered control without re-laying out the entire control or recreating user interface elements. Moving a surface is a cheaper operation for a CPU and can easily be accelerated using a GPU.06-07-2012
20140143700RENDER TRANSFORM BASED SCROLLING AND PANNING FOR SMOOTH EFFECTS - An information display system is described herein that separates rendering of information from receiving that information so that the rendering portion can be quickly displayed to the user and the data can arrive as it is available to provide further detail. The rendering portion creates a hardware surface measured to fill the area to be consumed by the list box or other control. Independently, the information retrieval portion queries information from a server or other source and processes the information as it is received. The system can then perform a transformation on the previously created hardware surface to insert the information in the rendered control without re-laying out the entire control or recreating user interface elements. Moving a surface is a cheaper operation for a CPU and can easily be accelerated using a GPU.05-22-2014

Hardik Shah, Bellevue, WA US

Patent application numberDescriptionPublished
20100285885MASSIVELY MULTIPLAYER GAME MESSAGE SCHEDULING - A massively multiplayer game management service includes a scheduling module that establishes a message receiving period and a game data aggregation period. The massively multiplayer game management service further includes a message receiving module that, during the message receiving period that overlaps at least part of the game data aggregation period, receives a message from a player client. The message may include an identifier and an execution time that follows the game data aggregation period. The massively multiplayer game management service further includes a message sending module that sends game data, aggregated in a game space location corresponding to the identifier, to the player clients upon occurrence of the execution time.11-11-2010
20110275431ROLE ASSIGNMENT IN MULTIPLAYER GAMES - Dynamic role selection of players for different roles in multiplayer gaming sessions is provided. Users seeking to participate in different roles in the game may request participation in the role. Selection of players for roles is made dynamically by varying a selection component for different sessions of the game. The selection component may be a user's game score over different time periods, and can be rotated for different sessions of the game, so that various levels of players have an opportunity to fill game roles.11-10-2011

Harshadkumar Shah, Bonney Lake, WA US

Patent application numberDescriptionPublished
20120199047Meterable Fiberous Material - A particle or particles of cellulosic wood pulp fibers having a top and bottom face and a hexagonal perimeter, and methods of using it.08-09-2012

Harshadkumar M. Shah, Bonney Lake, WA US

Patent application numberDescriptionPublished
20100163199READILY DEFIBERED PULP PRODUCT - A wet-laid wood pulp product containing cellulose pulp fibers and elongate precipitated calcium carbonate having a diameter of 0.015 to 0.6 microns at its maximum diameter and a length of 1 to 10 microns and the calcium carbonate being incorporated within the sheet and a method for making the product.07-01-2010
20100163200METHOD FOR MAKING READILY DEFIBERED PULP PRODUCT - A wet-laid wood pulp product containing cellulose pulp fibers and elongate precipitated calcium carbonate having a diameter of 0.015 to 0.6 microns at its maximum diameter and a length of 1 to 10 microns and the calcium carbonate being incorporated within the sheet and a method for making the product.07-01-2010
20100307702Meterable Fiberous Material - A particle or particles of cellulosic wood pulp fibers having a top and bottom face and a hexagonal perimeter, and methods of using it.12-09-2010
20120208933POLYMERIC COMPOSITES - A composition comprising 65 to 90 weight percent kraft chemical wood pulp fibers and a thermoplastic polymer and a method of making the composition.08-16-2012
20130005859Fiber for Fiber Cement and Resulting Product - A fiber-cement product which includes a treated cellulose wood pulp fiber. The fiber is treated with fibrillated carboxymethyl cellulose or a carboxyethyl cellulose and poly (diallyldimethyl ammonium)chloride. The fiber can be bleached or partially bleached, refined or unrefined or a mixture of refined and unrefined fiber.01-03-2013
20130206035Composite Polymer - A composition comprising 10 to 50 weight % wood pulp fiber and 45 to 85 wt % thermoplastic polymer wherein the composition has a brightness of at least 20 as measured by the Brightness Test. The wood pulp fiber can be bleached chemical wood pulp fiber. The brightness may be at least 30 as measured by the Brightness Test.08-15-2013
20130206036Composite Polymer - A composition comprising 10 to 50 wt % wood pulp fiber and 45 to 85 wt % thermoplastic polymer wherein the average dispersion of the fibers within the thermoplastic polymer composition is equal to or greater than 90% as determined by the Dispersion Test. The pulp can be bleached chemical wood pulp fiber.08-15-2013
20130206037Composite Polymer Molded Product - A molded part comprising 10 to 50 weight % wood pulp fiber, 45 to 85 weight % thermoplastic polymer and having an edge extending between two faces wherein the edge has two tactile defects or less per foot or less of edge length.08-15-2013
20130210965Composite Polymer - A composition comprising 10 to 50 wt % wood pulp fiber and 45 to 85 wt % thermoplastic polymer wherein the dilution level for detection in a bag at 40° C. is equal to or less than 450 as determined by ASTM E679.08-15-2013
20130338269FIBER FOR FIBER CEMENT AND RESULTING PRODUCT - A fiber-cement product which includes a treated cellulose wood pulp fiber. The fiber is treated with fibrillated carboxymethyl cellulose or a carboxyethyl cellulose and poly(diallyldimethylammonium chloride). The fiber can be bleached or partially bleached, refined or unrefined or a mixture of refined and unrefined fiber.12-19-2013

Patent applications by Harshadkumar M. Shah, Bonney Lake, WA US

Harshit Shah, Bothell, WA US

Patent application numberDescriptionPublished
20130044123USER-SPECIFIED IMAGE COLORIZATION FOR APPLICATION USER INTERFACE - Techniques involving dynamic colorization of graphical user interfaces. One representative technique includes enabling a user to specify colors in which user interface elements will be colored in an application. An application colorization service is initiated in response to the user specification of the colors, which is used at least to obtain the colors specified by the user, and to create bitmap images of the application's user interface elements using the user-specified colors. A bitmap image output location is made accessible to the application to enable the application to retrieve the created bitmap images, and present the application using the application user interface elements having the user-specified colors.02-21-2013

Himesh Shah, Bothell, WA US

Patent application numberDescriptionPublished
20090106742Framework for Testing API of a Software Application - A test executor for testing an application programming interface of a software application includes a plurality of invokers, a mapper/converter, and a comparer. The plurality of invokers includes a software application invoker and a database application invoker. The software application invoker is adapted to communicate with a software application through an application programming interface of the software application while the database application invoker is adapted to communicate with a database application through an application programming interface of the database application. The mapper/converter is in communication with the plurality of invokers. The mapper/converter converts results from at least one of the software application invoker and the database application invoker into a common data format. The comparer is in communication with the mapper/converter and compares the results in the common data format to assess the functionality of the application programming interface of the software application.04-23-2009

Himesh Shah, Redmond, WA US

Patent application numberDescriptionPublished
20080235072ACHIEVING RECURRING ITEM RECORDINGS FROM CALENDARING APPLICATIONS OVER LOB SYSTEMS - Recurring appointment items in a calendaring application are synchronized and recorded in a backend Line Of Business (LOB) service. Items marked in the calendaring application for time recording are used to create a recurring bound item with extended properties. A sweeper module scans on every run the mailbox for such recurring bound items. Occurrences of bound recurring appointments, which occur between the last scan and the current scan are determined and detached from the corresponding recurring series such that standalone bound items are created for such occurrences that can be recognized by an LOB application. Entries for bound items are retrieved from a client data store and synchronized it with the backend LOB service through a create-, update-, or delete-operation request.09-25-2008

Hitesh Shah, Seattle, WA US

Patent application numberDescriptionPublished
20090052424SHARING OF WIRELESS TELEPHONE SERVICES FOR A PERSONAL WIRELESS TELEPHONE AND A VEHICULAR WIRELESS TELEPHONE - Sharing of wireless telephone services between a subscriber's personal wireless telephone and the subscriber's vehicular wireless telephone. The shared service may be a connectivity service, allowing the subscriber's personal wireless telephone to communicate directly with the subscriber's vehicular wireless telephone. Alternately, or additionally, the shared service may be one or more services provided for by the wireless service agreement plan of the subscriber's vehicular wireless telephone or the subscriber's personal wireless telephone.02-26-2009

Jignesh Shah, Bellevue, WA US

Patent application numberDescriptionPublished
20110179045Template-Based Management and Organization of Events and Projects - A space in which a user may organize data and collaborate with other users is provided. Project data and metadata may be saved into a reusable template and stored in a repository, wherein other users may discover and download the template for use as a resource for a related project type. A template may contain various document types that may expose a breadth of applications and application functionalities that may be utilized for a given task or project. Questions and answers, task templates, and terminology may also be provided. Project templates may allow for collaboration on projects, wherein business and/or social groups may collaborate quickly, easily, and more completely.07-21-2011
20110179049Automatic Aggregation Across Data Stores and Content Types - Project-related data may be aggregated from various data sources, given context, and may be stored in a data repository or organizational knowledge base that may be available to and accessed by others. Documents, emails, contact information, calendar data, social networking data, and any other content that is related to a project may be brought together within a single user interface, irrespective of its data type. A user may organize and understand content, discover relevant information, and act on it without regard to where the information resides or how it was created.07-21-2011
20110179060Automatic Context Discovery - An automatic discovery of content to add to a data store for a project is disclosed. A data item may be parsed for data features that are contextually relevant to a given project or task. Discovered interesting data may be extracted and mapped to various search mechanisms. A search may be built and applied to various data sources to discover data items based on the contextually relevant data features. Search results from various search mechanisms may be displayed in a single user interface and may be presented to a user.07-21-2011
20110179061Extraction and Publication of Reusable Organizational Knowledge - An analysis module, when triggered by a synchronization framework when a new data item is added to a project data store, runs a series of analysis feature extractors on the new content. An analysis may be conducted, and features of interest may be extracted from the data item. The analysis utilizes natural language processing, as well as other technologies, to provide an automatic or semi-automatic extraction of information. The extracted features of interest are saved as metadata within the project data store, and are associated with the data item from which it was extracted. The analysis module may be utilized to discover additional information that may be gleaned from content that is already in the project data store.07-21-2011

Jyoti Shah, Seattle, WA US

Patent application numberDescriptionPublished
20120016011RNA Interference Mediated Inhibition of Connective Tissue Growth Factor (CTGF) Gene Expression Using Short Interfering Nucleic Acid (siNA) - The present invention relates to compounds, compositions, and methods for the study, diagnosis, and treatment of traits, diseases and conditions that respond to the modulation of CTGF gene expression and/or activity, and/or modulate a CTGF gene expression pathway. Specifically, the invention relates to double-stranded nucleic acid molecules including small nucleic acid molecules, such as short interfering nucleic acid (siNA), short interfering RNA (siRNA), double-stranded RNA (dsRNA), micro-RNA (miRNA), and short hairpin RNA (shRNA) molecules that are capable of mediating or that mediate RNA interference (RNAi) against CTGF gene expression.01-19-2012

Jyoti K. Shah, Seattle, WA US

Patent application numberDescriptionPublished
20120004282RNA Interference Mediated Inhibition of the Intercellular Adhesion Molecule 1 (ICAM-1) Gene Expression Using Short Interfering Nucleic Acid (siNA) - The present invention relates to compounds, compositions, and methods for the study, diagnosis, and treatment of traits, diseases and conditions that respond to the modulation of ICAM-1 gene expression and/or activity, and/or modulate a ICAM-1 gene expression pathway. Specifically, the invention relates to double-stranded nucleic acid molecules including small nucleic acid molecules, such as short interfering nucleic acid (siNA), short interfering RNA (siRNA), double-stranded RNA (dsRNA), micro-RNA (miRNA), and short hairpin RNA (shRNA) molecules that are capable of mediating or that mediate RNA interference (RNAi) against ICAM-1 gene expression.01-05-2012
20120016010RNA Interference Mediated Inhibition of BTB and CNC Homology 1, Basic Leucine Zipper Transcription Factor 1 (BACH1) Gene Expression Using Short Interfering Nucleic Acid (siNA) - The present invention relates to compounds, compositions, and methods for the study, diagnosis, and treatment of traits, diseases and conditions that respond to the modulation of Bach1 gene expression and/or activity, and/or modulate a Bach1 gene expression pathway. Specifically, the invention relates to double-stranded nucleic acid molecules including small nucleic acid molecules, such as short interfering nucleic acid (siNA), short interfering RNA (siRNA), double-stranded RNA (dsRNA), micro-RNA (miRNA), and short hairpin RNA (shRNA) molecules that are capable of mediating or that mediate RNA interference (RNAi) against Bach1 gene expression.01-19-2012
20120029054RNA Interference Mediated Inhibition of GATA Binding Protein 3 (GATA3) Gene Expression Using Short Intefering Nucleic Acid (siNA) - The present invention relates to compounds, compositions, and methods for the study, diagnosis, and treatment of traits, diseases and conditions that respond to the modulation of GATA3 gene expression and/or activity, and/or modulate a GATA3 gene expression pathway. Specifically, the invention relates to double-stranded nucleic acid molecules including small nucleic acid molecules, such as short interfering nucleic acid (siNA), short interfering RNA (siRNA), double-stranded RNA (dsR-NA), micro-RNA (miRNA), and short hairpin RNA (shRNA) molecules that are capable of mediating or that mediate RNA interference (RNAi) against GATA3 gene expression.02-02-2012
20120035247RNA Interference Mediated Inhibition of Signal Transducer and Activator of Transcription 6 (STAT6) Gene Expression Using Short Interfering Nucleic Acid (siNA) - The present invention relates to compounds, compositions, and methods for the study, diagnosis, and treatment of traits, diseases and conditions that respond to the modulation of STAT6 gene expression and/or activity, and/or modulate a STAT6 gene expression pathway. Specifically, the invention relates to double-stranded nucleic acid molecules including small nucleic acid molecules, such as short interfering nucleic acid (siNA), short interfering RNA (siRNA), double-stranded RNA (dsR-NA), micro-RNA (miRNA), and short hairpin RNA (shRNA) molecules that are capable of mediating or that mediate RNA interference (RNAi) against STAT6 gene expression.02-09-2012

Ketan R. Shah, Olympia, WA US

Patent application numberDescriptionPublished
20110073289LOW PROFILE BLOWER RADIAL HEATSINK - A cooling device, such as for cooling a chip and socket may have a centrifugal blower outside of a radial heatsink. In addition, supports for coupling the blower to a center motor may comprise overhead fan blades effectively creating a radial fan in series with the blower to maximize airflow and pressure capability and to minimize the noise. The vertical location of blower may further allow to improve motherboard component as well as system cooling all while reducing the vertical profile of the cooling device.03-31-2011
20120216029METHOD, APPARATUS, AND SYSTEM FOR ENERGY EFFICIENCY AND ENERGY CONSERVATION INCLUDING CONFIGURABLE MAXIMUM PROCESSOR CURRENT - An apparatus, method and system is described herein for providing multiple maximum current configuration options including corresponding turbo frequencies for a processing device. Available options for a processor are determined by initialization code. And based on platform electrical capabilities, an optimal one of the multiple current configuration options is selected. Moreover, during runtime another current configuration is dynamically selected based on current configuration considerations to provide high flexibility and best possible performance per part and computing platform.08-23-2012
20130007440METHOD AND APPARATUS FOR CONFIGURABLE THERMAL MANAGEMENT - Embodiments of an apparatus, system and method are described for configurable processor thermal management. An apparatus may comprise, for example, a processor arranged to operate in a plurality of thermal modes comprising a thermal limit down mode, a normal thermal limit mode and a thermal limit up mode, and thermal management logic operative to select a thermal mode based on one or more properties of the apparatus. Other embodiments are described and claimed.01-03-2013
20130285545THERMAL MANAGEMENT FOR LIGHT-EMITTING DIODES - Embodiments of the invention provide lighting systems that employ light-emitting diode (LED) chips as active lighting elements. Heat management components for the LED chips employed in the lighting sources are provided. In embodiments of the invention, LED chips are cooled by one or more heatspreaders and heat sinks attached to a substrate that houses the LED chip and/or the topside of the LED chip.10-31-2013

Patent applications by Ketan R. Shah, Olympia, WA US

Kushal Shah, Redmond, WA US

Patent application numberDescriptionPublished
20110107306MULTI-VIEW DEBUGGING - Debugging an executing process. A method includes accessing a unique key that is common to two or more different representations of a same function in the process. A runtime for the executing process is annotated with the unique key. The method further includes detecting that the function is executing. The unique key is used to provide an indication in one or more of the two or more different representations that the function is executing.05-05-2011
20110246872REPLACEMENT OF DATA ELEMENT IN A GRAPH - The generation and/or use of a hierarchical structure of model elements such as those that might be portions of a computer program. If it is determined that if a particular one of the model elements should be changed from one model element type to another model element type, that change is automatically made. The determination of whether the change should be made may be based on monitoring of actual behavior of the software program. The determination might alternatively be made based on expressed gestures of an author using an authoring program that visualizes the hierarchical structure of model elements.10-06-2011

Kushal Shah, Bellevue, WA US

Patent application numberDescriptionPublished
20100251155PLACEHOLDER ACTIVITIES AND IN-LINING OF CODE EDITORS IN WORKFLOW DESIGNER - Developing a declarative workflow application. In a first instance of a workflow designer application, user input is received defining a declarative workflow definition with workflow elements. Some of the workflow elements may be dummy workflow elements having no underlying imperative code. This declarative workflow definition can be provided to a developer. The developer can cause the workflow definition to be loaded into a second instance of a workflow designer application where it is graphically displayed. The developer can provider user input in the second instance of the workflow designer selecting workflow elements to be replaced. Workflow elements can be replaced with existing replacement workflow elements, or by workflow elements developed by the developer to replace selected elements. Embodiments may also include the ability to in-line imperative code editors instantiated by selecting workflow elements to replace.09-30-2010

Kushal Jagdish Shah, Bellevue, WA US

Patent application numberDescriptionPublished
20100058297SEAMLESS DEBUGGING AMONG DIFFERENT APPLICATION VIEWS - In an embodiment, a computer system initiates an application debugging process for an application that is to be debugged and maps runtime object elements of the application to both code elements and graphical elements. The computer system appends portions of software code to each runtime object element so that a runtime event is outputted indicating which corresponding graphical or code element is currently being processed. The computer system accesses the outputted runtime events to determine which graphical or code element is currently being processed and, based on the accessed outputted runtime events and based on the mappings, displays the elements currently being debugged in a first view. The computer system, based on the accessed outputted runtime events and based on the mappings, switches views from the first view to a second view without restarting the application debugging process for the application being debugged.03-04-2010

Mauli Shah, Bellevue, WA US

Patent application numberDescriptionPublished
20090249125DATABASE QUERYING - Data stored in relational databases can be retrieved using a relational database query language, while data stored in a multidimensional database is typically retrieved using a multidimensional database query language. However, most users do not have a functional working knowledge of multidimensional database query languages, which leaves large amounts of data inaccessible. Further, while some relational database query languages may be translated into a multidimensional database language, the information generated by such translations is often unusable, or returns large numbers of errors. In order to obtain effective translation of a relational database query language to a multidimensional database query language effective translation and filtering needs to occur. Using effective mapping and retrieval of database metadata along with effective, customizable business logic filtering of query components, more effective and reliable results may be achieved.10-01-2009

Mehul Shah, Redmond, WA US

Patent application numberDescriptionPublished
20090299863PERFORMING A CHECK TRANSACTION USING ADD-IN MODULES - A point-of-sale (POS) module and associated methods are described for performing a transaction involving a check. The POS module interacts with one or more add-in modules. Each add-in module is associated with a particular method for processing a payment using a check. Accordingly, the POS module can accommodate multiple different workflows by plugging in appropriate add-in modules.12-03-2009
20100153423BATCH DATA SYNCHRONIZATION WITH FOREIGN KEY CONSTRAINTS - Data in tables with foreign key relationship is synchronized in batches employing a two-pass process during playback based on whether the foreign key constraint is a linear dependency, self-referencing, or cyclic. A separate table containing a primary key of records and database timestamp columns for change operations may also be used for batch synchronization in addition to or instead of adding database timestamp columns to existing tables.06-17-2010
20100191606TAX CALCULATION EXTENSIBILITY TECHNIQUES - Various technologies and techniques are disclosed for performing tax calculations. An add-in model is described for developing add-in(s) for performing tax calculations. The add-in(s) calculate taxes for one or more tax authorities for items contained in a transaction being processed by a point of sale application. The add-in model specifies functionality the add-in(s) need to implement before the add-in(s) can be used by the point of sale application. A method for configuring multiple add-ins is described. A first add-in is called to calculate a first partial tax owed and the first partial tax is received back. A second add-in is called to calculate a second partial tax owed and the second partial tax is received back. A total tax is calculated by adding the first partial tax with the second partial tax. A configuration user interface is also provided by the add-in.07-29-2010

Patent applications by Mehul Shah, Redmond, WA US

Mehul Shah, Sammamish, WA US

Patent application numberDescriptionPublished
20120092442Quality of Service Adjustments to Improve Network Utilization - Devices of a telecommunication network described herein are configured to reduce a service level associated with a quality of service offered by the telecommunication network to a user. The devices may reduce the service level responsive to data consumption by the user exceeding a threshold or responsive to data consumption associated with an application or data type. Also, the devices may be configured to increase a video-conversation-specific service level responsive to determining that a client device of the user is establishing a video conversation.04-19-2012
20120092990Quality of Service Adjustments to Improve Network Utilization - Devices of a telecommunication network described herein are configured to reduce a service level associated with a quality of service offered by the telecommunication network to a user. The devices may reduce the service level responsive to data consumption by the user exceeding a threshold or responsive to data consumption associated with an application or data type. Also, the devices may be configured to increase a video-conversation-specific service level responsive to determining that a client device of the user is establishing a video conversation.04-19-2012
20120142306Priority Communications in a Shared Access Telecommunications Network - Described herein are systems and techniques that can coordinate priority communications for the users of one telecommunications network relative to the users of other such networks. This may be useful in emergency situations where one of the networks comprises a public services entity, which may from time to time demand priority communications in order to efficiently respond to urgent situations.06-07-2012
20130142043QUALITY OF SERVICE APPLICATION CONTROLLER AND USER EQUIPMENT APPLICATION PROFILER - Various topologies of a quality of service application controller and related techniques to optimize the communications performance an application executing on a device participating in a communications environment are disclosed. The communications environment may include a cellular network, an unlicensed spectrum network, or a combination of the two. The quality of service application controller observes one or more key performance indicators of the communications network, and retrieves a policy from a policy store specific to the application. The quality of service application controller then modifies the execution of the application and/or the configurable aspects of the communications environment to optimize the communications performance of the application. For example, the application's data throughput may be increased, the power draw of the application may be minimized, data requested by the application may be minimized, or the apparent response time of the application's response to a web service may be minimized.06-06-2013
20130258929Rule-Based Application Controller for Signaling Reduction - An application controller of a telecommunication device to receive a packet from an application of the telecommunication device and determine a signaling reduction rule associated with the application is described herein. Based at least in part on the signaling reduction rule, the application controller performs a signaling reduction action associated with transmission of the packet.10-03-2013
20130258966Application Controller for Quality-of-Service Configuration of a Telecommunication Device Radio - An application controller of a telecommunication device to determine, for a packet flow of an application, a quality-of-service rule associated with the application is described herein. The application controller then configures a data bearer for a wireless communication stack of the telecommunication device with a quality-of-service specified by the quality-of-service rule and provides a packet of the packet flow for transmission to a remote recipient via the configured data bearer.10-03-2013

Mehul Jayant Shah, Sammamish, WA US

Patent application numberDescriptionPublished
20100208648LOCATION-BASED IMS SERVER SELECTION - A user location is estimated based on an IP address assigned to the user's device/equipment during registration for multimedia application services that are provided over the IP multimedia subsystems (IMS) network. The latitude and longitude information of the user location is obtained based on the IP address assigned to the user device/equipment. Such information is used to determine an appropriate server(s) for establishing an IP multimedia service session. In some embodiments, a closely located IMS server(s) is selected for proxying, interrogating, providing or delivering IP multimedia services. In this manner, each user device/equipment communicates with IMS servers that are located close to the user and thus, the geographically distributed load among the IMS gateway servers can be achieved.08-19-2010
20100211628SELECTION OF ROAMING GATEWAY - A system and method for selecting a proxy gateway server for controlling data traffic initiated by a user device roaming on a visited network is disclosed. The method includes utilizing a mobility anchor server associated with the visited network to receive a request to activate a data traffic session from a user device, identify the user device as a roaming user device, and select a proxy gateway server from one or more servers associated with the visited network for controlling the data traffic initiated by the roaming user device. The selection of a proxy server is accomplished by querying a DNS server associated with the visited network with a pre-defined roaming APN string associated with the visited network and, in response to the query, receiving an Internet Protocol (IP) address of the proxy gateway server from the DNS server.08-19-2010
20120195294MANAGING ACCESS GATEWAYS - Systems and methods for the management of communications related to telecommunications-based devices are provided. Gateway computing devices corresponding to a radio communication network can modify the static provisioning of communication network access gateway to telecommunications-based devices accessing the wireless communication network. The modification of the static provisioning of gateway devices is based on subscription information associated with the requesting telecommunications-based device or based on general network policies that can be dynamically updated.08-02-2012
20120196588COMMUNICATION PROTOCOL PREFERENCES - Systems and methods for the management of communications related to telecommunications-based devices are provided. Telecommunications-based devices initiate requests to gateway computing devices corresponding to a radio communication network to establish data communications. The gateway computing device accepts the communication request and specifies an ordered preference of one or more communication protocols that will be used telecommunications-based devices accessing the wireless communication network. The telecommunications-based device processes the acceptance and selects a communication protocol from the ordered preference provided by the gateway computing device.08-02-2012
20120198046MOBILE DEVICE BANDWIDTH THROTTLING - System and methods for managing communications related to telecommunications-based devices are provided. Gateway computing devices corresponding to a radio communication network can modify the policies associated with telecommunications-based devices as a function of the usage of the radio communication network. The modification of the policies corresponds to monitoring of telecommunications-based device data usage and comparing the monitored data usage with data usage thresholds. The modification of the policies can also correspond to monitoring telecommunications-based device data usage and adjusting data usage quotas. The resulting modification can limit the throughput of data, prevent additional data requests, or modify different aspect of the data communications via the radio communication network.08-02-2012
20140233455COMMUNICATION PROTOCOL PREFERENCES - Systems and methods for the management of communications related to telecommunications-based devices are provided. Telecommunications-based devices initiate requests to gateway computing devices corresponding to a radio communication network to establish data communications. The gateway computing device accepts the communication request and specifies an ordered preference of one or more communication protocols that will be used telecommunications-based devices accessing the wireless communication network. The telecommunications-based device processes the acceptance and selects a communication protocol from the ordered preference provided by the gateway computing device.08-21-2014
20140242980SELECTION OF ROAMING GATEWAY - A system and method for selecting a proxy gateway server for controlling data traffic initiated by a user device roaming on a visited network is disclosed. The method includes utilizing a mobility anchor server associated with the visited network to receive a request to activate a data traffic session from a user device, identify the user device as a roaming user device, and select a proxy gateway server from one or more servers associated with the visited network for controlling the data traffic initiated by the roaming user device. The selection of a proxy server is accomplished by querying a DNS server associated with the visited network with a pre-defined roaming APN string associated with the visited network and, in response to the query, receiving an Internet Protocol (IP) address of the proxy gateway server from the DNS server.08-28-2014

Patent applications by Mehul Jayant Shah, Sammamish, WA US

Mehul Y. Shah, Redmond, WA US

Patent application numberDescriptionPublished
20090313684USING WINDOWS AUTHENTICATION IN A WORKGROUP TO MANAGE APPLICATION USERS - An system for authenticating users of an application program executing at a front-end computer using the security features built into the operating system of a logon computer is provided. Initially, an administrator establishes user accounts for each user with an operating system executing at the logon computer with access to application resources. When the application program starts executing at the front-end computer, the application program prompts the user for credentials. The application program attempts to access resources managed by the logon computer using the received credentials. When access to a resource is successful, the application program knows that the logon computer has authenticated the user and the user is authorized to access the resource. In this manner, the application program can take advantage of the security features built into the operating system executing at the logon computer to authenticate users of the application program and authorize access to application resources.12-17-2009
20090319382EXTENSIBLE FRAMEWORK FOR SUPPORTING DIFFERENT MODES OF PAYMENTS - A method and system for providing an extensible framework for a POS application is provided. A POS application may be extended using a payment format add-in, a workflow add-in, a financial services provider add-in, or a combination of add-ins. A payment format add-in provides support for a payment format not included in the payment formats built into the POS application. A workflow add-in provides a configurable workflow that can be used to extend a built-in payment format or a payment format add-in. A financial services provider add-in provides support for interacting with a financial services provider for which the POS application does not provide built-in support. Each add-in can implement, for example, logic for processing a payment transaction, a portion of a payment transaction, and configuring steps for processing a payment transaction.12-24-2009
20100274813EXTENSIBLE FRAMEWORK FOR DATA IMPORT AND EXPORT - A modular framework for data import/export in an application that allows modules/components to be independently developed for importing and exporting data related to specific entities, including the handling of dependencies between entities. The framework is metadata driven which allows new entities to be introduced in the application with new modules for importing/exporting data related to those entities, without updating modules for exporting existing entities. Each type of entity is defined with a schema that represents the logical entity such that the entity is agnostic as to how the entity data is stored in database tables. A master configuration file is created for the application that lists each entity that can be imported or exported by the application, and defines how the framework imports or exports the business entity. Additionally, dynamic batching is provided to divide large datasets into multiple batches for suitable consumption by consumers of the exported data.10-28-2010
20110161186EXTENSIBLE FRAMEWORK FOR SUPPORTING DIFFERENT MODES OF PAYMENTS - A method and system for providing an extensible framework for a POS application is provided. A POS application may be extended using a payment format add-in, a workflow add-in, a financial services provider add-in, or a combination of add-ins. A payment format add-in provides support for a payment format not included in the payment formats built into the POS application. A workflow add-in provides a configurable workflow that can be used to extend a built-in payment format or a payment format add-in. A financial services provider add-in provides support for interacting with a financial services provider for which the POS application does not provide built-in support. Each add-in can implement, for example, logic for processing a payment transaction, a portion of a payment transaction, and configuring steps for processing a payment transaction.06-30-2011
20110320433Automated Joining of Disparate Data for Database Queries - Described is associating metadata with different sources of data (e.g., database tables) that allows a single view of data from the sources to be created. An administrator creates baseviews corresponding to database tables and associates metadata with the baseviews, including primary key metadata for the baseviews and meta-tags for one or more of the columns of each baseview. A user selects fields (corresponding to table columns) from a starting baseview, along with fields from any other baseview that has metadata that matches the starting baseview's metadata. A join mechanism automatically creates the view if a metadata match is detected.12-29-2011
20130006664Data Change Tracking and Event Notification - The described implementations relate to updating views in a database system. One implementation can identify an active view that retrieves records from a database and determine one or more physical tables in the database that are referenced by the active view. The implementation can track one or more columns in the physical tables that are used by the active view and identify a change to the physical tables in a transaction log of the database. If the change does not affect the one or more columns, the change can be treated as an ignorable change for the active view.01-03-2013
20130006963DATA CHANGE TRACKING AND EVENT NOTIFICATION - The described implementations relate to updating views in a database system. One implementation can identify an active view that retrieves records from a database and determine one or more physical tables in the database that are referenced by the active view. The implementation can track one or more columns in the physical tables that are used by the active view and identify a change to the physical tables in a transaction log of the database. If the change does not affect the one or more columns, the change can be treated as an ignorable change for the active view.01-03-2013
20130007069Data Change Tracking and Event Notification - The described implementations relate to updating views in a database system. One implementation can identify an active view that retrieves records from a database and determine one or more physical tables in the database that are referenced by the active view. The implementation can track one or more columns in the physical tables that are used by the active view and identify a change to the physical tables in a transaction log of the database. If the change does not affect the one or more columns, the change can be treated as an ignorable change for the active view.01-03-2013
20130110542PATIENT DATA MANAGEMENT05-02-2013
20130298212USING WINDOWS AUTHENTICATION IN A WORKGROUP TO MANAGE APPLICATION USERS - An system for authenticating users of an application program executing at a front-end computer using the security features built into the operating system of a logon computer is provided. Initially, an administrator establishes user accounts for each user with an operating system executing at the logon computer with access to application resources. When the application program starts executing at the front-end computer, the application program prompts the user for credentials. The application program attempts to access resources managed by the logon computer using the received credentials. When access to a resource is successful, the application program knows that the logon computer has authenticated the user and the user is authorized to access the resource. In this manner, the application program can take advantage of the security features built into the operating system executing at the logon computer to authenticate users of the application program and authorize access to application resources.11-07-2013

Patent applications by Mehul Y. Shah, Redmond, WA US

Nevil A. Shah, Redmond, WA US

Patent application numberDescriptionPublished
20090083494PROBABILISTIC TECHNIQUE FOR CONSISTENCY CHECKING CACHE ENTRIES - A facility for determining whether to consistency-check a cache entry is described. The facility randomly or pseudorandomly selects a value in a range. If the selected value satisfies a predetermined consistency-checking threshold within the range, the facility consistency-checks the entry, and may decide to propagate this knowledge to other cache managers. If, on the other hand, the selected value does not satisfy the consistency-checking threshold, the facility determines not to consistency-check the entry.03-26-2009

Nihar Shah, Sammamish, WA US

Patent application numberDescriptionPublished
20130067464VIRTUAL MACHINE MOBILITY USING RESOURCE POOLS - In one embodiment, a portable virtual machine may use a generic resource allocation request to access a host resource. A virtualization host may receive a generic resource allocation request 03-14-2013

Nihar N. Shah, Sammamish, WA US

Patent application numberDescriptionPublished
20130014102PLANNED VIRTUAL MACHINES - A planned virtual machine, for use in staging the construction of a virtual machine. Such a planned virtual machine may be used as part of a method for migrating virtual machines. The method may include creating a planned virtual machine based on a first realized virtual machine or a template, performing a configuration operation on the planned virtual machine, and converting the planned virtual machine to a second realized virtual machine. The configuration operation may comprise interaction with a virtualization platform managing the planned virtual machine and may be based on input provided by a user.01-10-2013

Nihar Niranjan Shah, Sammamish, WA US

Patent application numberDescriptionPublished
20130064133Unified Policy Management for Extensible Virtual Switches - Systems, methods, and computer storage media are described herein that configure a switch extension associated with a virtual switch with one or more settings. In response to the configuring, the systems, methods, and computer storage media persist the one or more settings and apply the persisted one or more settings to a target switch extension of a target virtual switch. The systems, methods, and computer storage media receive the settings through a management interface. Also, the systems, methods, and computer storage media receive requests for information associated with the switch extension and provide the switch extension information in response.03-14-2013

Nilesh R. Shah, Bothell, WA US

Patent application numberDescriptionPublished
20090319473METHOD AND SYSTEM OF USING A LOCAL HOSTED CACHE AND CRYPTOGRAPHIC HASH FUNCTIONS TO REDUCE NETWORK TRAFFIC - The described method and system enables a client at a branch office to retrieve data from a local hosted cache instead of an application server over a WAN to improve latency and reduce overall WAN traffic. A server at the data center may be adapted to provide either a list of hashes or the requested data based on whether a hosted cache system is enabled. A hosted cache at the client side may provide the data to the client based on the hashes. The hashes may be generated to provide a fingerprint of the data which may be used to index the data in an efficient manner.12-24-2009
20130067080Storage and Communication De-Duplication - Storage and communication de-duplication are described. In one or more implementations, a system comprises one or more modules that are implemented at least partially in hardware, the one or more modules configured to utilize one or more algorithms to calculate hashes of chunks of data, the hashes used to replace the chunks in the data for storage locally in the system as well as to communicate the hashes in response to a request received via a network for the data to avoid communicating at least one of the chunks of the data via the network.03-14-2013

Niraj D. Shah, Kirkland, WA US

Patent application numberDescriptionPublished
20100058363Intent-Oriented User Interface Application Programming Interface - In accordance with one or more aspects of the intent-oriented user interface Application Programming Interface, a user interface platform includes an Application Programming Interface (API). An indication of multiple commands to be exposed for an application via a user interface is received from the application. For each of the multiple commands, a manner of display of a control corresponding to the command and a position for the control is determined on behalf of the application. Additionally, for each of the multiple commands the control corresponding to the command is displayed in accordance with the determined manner of display and the position for the control. The application is notified of user interactions with the user interface.03-04-2010

Nirav Shah, Redmond, WA US

Patent application numberDescriptionPublished
20090043627System and method for calendar presence retrieval - A presence system enables retrieval of calendar presence information of presentities from calendar servers using a calendar agent and calendar interfaces to the calendar servers. Each calendar server maintains calendar schedule information for one or more of the presentites. The calendar agent is operable to generate queries for the calendar schedule information to the calendar servers via a respective calendar interface for each calendar server. The calendar agent is further operable to receive calendar schedule information from the calendar servers via the respective calendar interfaces, and to convert the received calendar schedule information into calendar presence information. Each calendar interface is configured to communicate with the calendar agent via a first protocol and to communicate with a respective one of the calendar servers via a respective second protocol.02-12-2009

Nirav Shah, Seattle, WA US

Patent application numberDescriptionPublished
20090138846EXTENDED MACRO RECORDING - Various technologies and techniques are disclosed for extending macro recordings. A request is received to record a macro in a macro-enabled application using an original recording engine. The request is intercepted, and the macro is recorded using a separate recording engine than the original recording engine. To record the macro using the separate recording engine, a vtable is intercepted from a macro recording mechanism used by an original recording engine. Calls contained in the vtable are then redirected to one or more functions in a separate recording engine. The macro is output to a different format than an original format of the original recording engine.05-28-2009
20090328050AUTOMATIC LOAD BALANCING, SUCH AS FOR HOSTED APPLICATIONS - A dynamic load balancing system is described that determines the load of resources in a hosted environment dynamically by monitoring the usage of resources by each customer and determines the number of customers hosted by a server based on the actual resources used. The system receives a performance threshold that indicates when a server is too heavily loaded and monitors the resource usage by each customer. When the load of an overloaded server in the hosted environment exceeds the received performance threshold, the system selects a source customer currently hosted by the overloaded server to move to another server.12-31-2009

Nirav Shah, Bothell, WA US

Patent application numberDescriptionPublished
20110307948EXTENDING A CUSTOMER RELATIONSHIP MANAGEMENT EVENTING FRAMEWORK TO A CLOUD COMPUTING ENVIRONMENT IN A SECURE MANNER - A customer relationship management (CRM) eventing framework may be extended to a cloud computing environment. A listening channel may be opened between a service and a service bus in a cloud computing environment. The cloud computing environment may also include an authenticating service. Service information for the service may be registered with a CRM. The CRM may receive a request made by a requester. The request may trigger a request processing pipeline in an eventing framework. The CRM may post event data responsive to the request to the service bus. The service may receive the event data, process it and may send back a confirmation or response. The CRM may finally send a response to the requester.12-15-2011
20120278786WORKFLOWS OR PROCESSES WITH DYNAMIC REFERENCE ACTIVITY - A placeholder activity is employed in a workflow or process definition, which may be loaded in a workflow design application even if the type of activity referred by the placeholder activity cannot be loaded. The “reference activity” enables a workflow or a process to bind to an actual activity type at runtime such that the workflow or process can dynamically use a latest version of the activity without a need to modify the workflow/process definition.11-01-2012
20150088971USING A PROCESS REPRESENTATION TO ACHIEVE CLIENT AND SERVER EXTENSIBLE PROCESSES - A system has actions that are performed on one or more clients, and other actions that are performed on a server. The computer system provides user input mechanisms that receive user inputs for customizing the computer system. A model of a customized process within the computing system is captured. Both server side and client side customizations are captured in a single process definition. The definition is stored and can be run later as is or as translated into an appropriate representation.03-26-2015

Patent applications by Nirav Shah, Bothell, WA US

Nirav Girish Shah, Redmond, WA US

Patent application numberDescriptionPublished
20080240370Testing acoustic echo cancellation and interference in VoIP telephones - Described is automatically testing the quality of an audio coupling between juxtaposed first and second digital telephones, e.g., VoIP telephones, such as to quantitatively determine the quality of audio echo cancellers in those digital telephones. An analyzer receives timestamps from a first telephone and second telephone during a calling session, including timestamps for when the second telephone initially provides audio (e.g., speech) to the first telephone, when the first telephone initially detects sound, when the first telephone initially provides audio to the second telephone, and when the second telephone initially detects sound. The analyzer uses the relative timing of the timestamps and the speech recognizer's outcome to determine whether the audio coupling is experiencing interference or echo. When the audio includes speech, a confidence level corresponding to accuracy of speech recognition also may establish the audio coupling's quality.10-02-2008

Nirav Yogesh Shah, Seattle, WA US

Patent application numberDescriptionPublished
20090049056Multi-tenant hosted application system - Technologies are described herein for implementing a hosted multi-tenant application system. The server computers utilized to provide the hosted application are organized into logical groupings of server computers called scale groups. One or more tenants are assigned to each scale group. When a new tenant is provisioned, the tenant is assigned to a scale group and a database server in the assigned scale group creates a database for the tenant. An association between the tenant and the scale group is also created in a shared configuration database. When a request is received from a tenant to access the hosted application, the shared configuration database is consulted to locate the scale group hosting the tenant. Once the appropriate scale group has been located, the request is redirected to the appropriate scale group for processing.02-19-2009
20090327139Loosely coupled hosted application system - Technologies are described herein for loosely coupling a hosted application system with other computing systems that provide related functionality. A hosted application system is provided in one embodiment that is loosely coupled to a marketing system, a sign-up system, a billing system, and a support system. The loose coupling of the systems allows the hosted application system to be easily configured to restrict the software to which a particular customer can subscribe based upon the capacity of the hosted application system, the qualifications of a customer, or other factors. The computing systems may be configured to communicate via idempotent network APIs, thereby permitting multiple retries to ensure successful completion of requests.12-31-2009

Nirav Yogesh Shah, Bothell, WA US

Patent application numberDescriptionPublished
20100138639SANDBOXED EXECUTION OF PLUG-INS - A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP. Moreover, the architecture is highly scalable, stateless, and low administration architecture for the execution of the plug-ins, which can be scaled by adding/removing additional sandbox servers on-the-fly without prior configuration.06-03-2010
20140245437SANDBOXED EXECUTION OF PLUG-INS - A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP. Moreover, the architecture is highly scalable, stateless, and low administration architecture for the execution of the plug-ins, which can be scaled by adding/removing additional sandbox servers on-the-fly without prior configuration.08-28-2014

Nitinkumar Shah, Seattle, WA US

Patent application numberDescriptionPublished
20120259748MOBILE EXPENSE CAPTURE AND REPORTING - A mobile computing device based expense capture and reporting system is provided. A mobile expense capture application is an integral part of a networked expense management service such as a Customer Relationship Management (CRM) or Enterprise Resource Planning (ERP) service. A user interface enables users to enter expense related information and accept/reject/edit prompted values for various entries. Upon completion of the entries, the information is transmitted to the networked service and/or stored locally. At least a portion of the information is automatically provided based on a location and/or action of the user. Furthermore, the mobile computing device is capable of capturing an expense document and retrieving at least some of the expense information from the captured document.10-11-2012

Omar J. Shah, Issaquah, WA US

Patent application numberDescriptionPublished
20120122842NAMPT AND ROCK INHIBITORS - Disclosed are compounds which inhibit the activity of NAMPT, compositions containing the compounds and methods of treating diseases during which NAMPT is expressed. Disclosed are compounds which inhibit the activity of ROCK, compositions containing the compounds and methods of treating diseases during which ROCK is expressed.05-17-2012

Sameer Vinod Shah, Seattle, WA US

Patent application numberDescriptionPublished
20100082151SYSTEMS AND METHODS FOR RECEIVING SHIPMENT PARCELS - Disclosed are various embodiments of systems and methods for receiving shipment parcels at materials handling facilities. A parcel receiving system has an imaging tunnel through which shipment parcels received at a materials handling facility are passed. While a shipment parcel is passing through the imaging tunnel, a camera captures at least one image of the parcel. The parcel image is electronically analyzed to discover various tracking information and to detect various types of exceptions, such as damage to the parcel or defective tracking information. In addition, the captured image is stored in order to create a visual record of the parcel at the time of reception. This record may be used in a variety of ways, such as resolving or tracking exceptions or providing feedback to the vendor or shipment carrier. In addition, the parcel image may be viewed by a user to enable the user to detect and/or resolve an exception. Thus, the overall process of receiving parcels is facilitated, and the percentage of parcels diverted to an exception bin may be decreased.04-01-2010
20100082152SYSTEMS AND METHODS FOR RECEIVING SHIPMENT PARCELS - Disclosed are various embodiments of systems and methods for receiving shipment parcels at materials handling facilities. A parcel receiving system has an imaging tunnel through which shipment parcels received at a materials handling facility are passed. While a shipment parcel is passing through the imaging tunnel, a camera captures at least one image of the parcel. The parcel image is electronically analyzed to discover various tracking information and to detect various types of exceptions, such as damage to the parcel or defective tracking information. In addition, the captured image is stored in order to create a visual record of the parcel at the time of reception. This record may be used in a variety of ways, such as resolving or tracking exceptions or providing feedback to the vendor or shipment carrier. In addition, the parcel image may be viewed by a user to enable the user to detect and/or resolve an exception. Thus, the overall process of receiving parcels is facilitated, and the percentage of parcels diverted to an exception bin may be decreased.04-01-2010
20130188039SYSTEMS AND METHODS FOR RECEIVING SHIPMENT PARCELS - Disclosed are various embodiments of systems and methods for receiving shipment parcels at materials handling facilities. A system comprises a tunnel and at least one sensor located in the tunnel. The system further comprises logic that obtains data that is correlated with an identifier for a shipment parcel. The logic causes the at least one sensor to collect sensor data for the shipment parcel in the tunnel. The logic further compares the sensor data with the data that is correlated with the identifier to determine whether there is an exception for the shipment parcel.07-25-2013
20140081447SYSTEMS AND METHODS FOR RECEIVING SHIPMENT PARCELS - Disclosed are various embodiments of systems and methods for receiving shipment parcels at, for example, materials handling facilities. In some embodiments, a parcel monitoring system detects an exception for a shipment parcel. The parcel monitoring system identifies a vendor associated with the shipment parcel. In response to the exception being detected, the parcel monitoring system controls a conveyor system in accordance with an action specified by an exception handling rule for the vendor.03-20-2014

Patent applications by Sameer Vinod Shah, Seattle, WA US

Samir V. Shah, Kirkland, WA US

Patent application numberDescriptionPublished
20100235431DATACENTER SYNCHRONIZATION - A datacenter infrastructure comprising a plurality of datacenters is configured to provide services to users. Data (e.g., application data) provided to respective datacenters from a user is synchronized between different datacenters comprised within “a cloud” according to a multilevel synchronization scheme. Respective levels of the multilevel synchronization operate to transfer different priority (user) data between the plurality of datacenters, wherein respective priorities are determined based upon the importance of the data in providing a service. For example, data used to perform a service is synchronized by a synchronization component facilitating a higher level of synchronization between datacenters, while data not routinely used to perform a service is synchronized by a lower priority synchronization component. Synchronization between datacenters allows a network address routing system to provide substantially uninterrupted routing of a user to an available or otherwise appropriate datacenter within the datacenter infrastructure, thereby providing increased service reliability and performance.09-16-2010

Sarthak Shah, Kirkland, WA US

Patent application numberDescriptionPublished
20100299343Identifying Task Groups for Organizing Search Results - Computer-readable media and computerized methods for automatically organizing search results according to task groups are provided. The methods involve aggregating a gallery of entities (e.g., search queries that share a common categorization) into a query class and assigning a dictionary (e.g., list of terms that are drawn from various sources) to the query class. The task groups are identified from the list of terms within the dictionary. The process of identification includes analyzing patterns of user search behavior to select terms from the list of terms, which reflect popular user search intents, and ranking the selected terms based on predetermined parameters to produce an ordering. Based on the ordering, a set of the selected terms that are highest ranked are declared the task groups. The task groups are employed to arrange the search results on a UI display and to provide a consistent and intuitive format for refining a search.11-25-2010
20120209835Identifying Task Groups for Organizing Search Results - Computer-readable media and computerized methods for automatically organizing search results according to task groups are provided. The methods involve aggregating a gallery of entities (e.g., search queries that share a common categorization) into a query class and assigning a dictionary (e.g., list of terms that are drawn from various sources) to the query class. The task groups are identified from the list of terms within the dictionary. The process of identification includes analyzing patterns of user search behavior to select terms from the list of terms, which reflect popular user search intents, and ranking the selected terms based on predetermined parameters to produce an ordering. Based on the ordering, a set of the selected terms that are highest ranked are declared the task groups. The task groups are employed to arrange the search results on a UI display and to provide a consistent and intuitive format for refining a search.08-16-2012
20140025664IDENTIFYING TERMS ASSOCIATED WITH QUERIES - Computer-readable media and computerized methods are provided for identifying terms associated with one or more queries, including aspects directed to manipulating a list of terms associated with a query class by extracting terms, identifying equivalences or relevant terms, and condensing or expanding the list of terms. In embodiments, synonymous terms can be identified. An updated list of terms can be written to a storage location in association with a query or query class.01-23-2014

Patent applications by Sarthak Shah, Kirkland, WA US

Sarthak D Shah, Kirkland, WA US

Patent application numberDescriptionPublished
20080235573Content Markup Transformation - Methods of correcting and transcoding markup language content for mobile devices are described. In an example, mobile device capabilities are determined. Content is processed to correct malformed tags in the content based on the determination. The corrected content is transcoded from a first mark-up language which is not supported by a mobile device into a second markup language which is supported by the mobile device.09-25-2008

Sarthak Deepak Shah, Kirkland, WA US

Patent application numberDescriptionPublished
20100317444USING A HUMAN COMPUTATION GAME TO IMPROVE SEARCH ENGINE PERFORMANCE - Human computation games are provided wherein a player is shown a page, such as a web page. The player is then asked to provide one or more terms that are intended to cause a search engine to return the page in response to performing a query using the terms. The terms provided by the player during game play are then collected, stored, and utilized to improve the performance of the search engine.12-16-2010
20120096033Disambiguation of Entities - Methods, systems, algorithms, and media are provided for disambiguating entities present in a received search query. Lists of categories from semi-structured data from external sites as well as internal sources are used to detect if ambiguity exists in an entity within the search query. Multiple senses or categories of the ambiguous entity are determined by ascertaining the primary intent of an entity extracted from a main term of a document. The probability of each sense is calculated by computing a total amount of traffic received for each of the senses of the ambiguous entity. The sense with the highest amount of computed traffic is the most probable determined sense.04-19-2012
20140324826TARGETED CONTENT PROVISIONING BASED UPON TAGGED SEARCH RESULTS - One or more techniques and/or systems are provided for tagging search results, organizing tagged search results for later access from various devices, public sharing of tagged search results, and/or providing targeted content based upon search results tagged by a user. That is, a user may tag a search result (e.g., a website, an image, a social network profile, etc.), such as through a one-click user input, with a tag to create a tagged search result. The tagged search result may be organized into a public tag collection for sharing and/or exploration of tagged search results by other users. The tagged search result may be organized into a personal tag collection for later access by the user from any device. Because the tagged search result may be indicative of an interest of the user, targeted content associated with the tagged search result may be provided to the user.10-30-2014
20140324827SEARCH RESULT ORGANIZING BASED UPON TAGGING - One or more techniques and/or systems are provided for tagging search results, organizing tagged search results for later access from various devices, public sharing of tagged search results, and/or providing targeted content based upon search results tagged by a user. That is, a user may tag a search result (e.g., a website, an image, a social network profile, etc.), such as through a one-click user input, with a tag to create a tagged search result. The tagged search result may be organized into a public tag collection for sharing and/or exploration of tagged search results by other users. The tagged search result may be organized into a personal tag collection for later access by the user from any device. Because the tagged search result may be indicative of an interest of the user, targeted content associated with the tagged search result may be provided to the user.10-30-2014
20140324828SEARCH RESULT TAGGING - One or more techniques and/or systems are provided for tagging search results, organizing tagged search results for later access from various devices, public sharing of tagged search results, and/or providing targeted content based upon search results tagged by a user. That is, a user may tag a search result (e.g., a website, an image, a social network profile, etc.), such as through a one-click user input, with a tag to create a tagged search result. The tagged search result may be organized into a public tag collection for sharing and/or exploration of tagged search results by other users. The tagged search result may be organized into a personal tag collection for later access by the user from any device. Because the tagged search result may be indicative of an interest of the user, targeted content associated with the tagged search result may be provided to the user.10-30-2014
20140324829TAGGED SEARCH RESULT MAINTAINANCE - One or more techniques and/or systems are provided for tagging search results, organizing tagged search results for later access from various devices, public sharing of tagged search results, and/or providing targeted content based upon search results tagged by a user. That is, a user may tag a search result (e.g., a website, an image, a social network profile, etc.), such as through a one-click user input, with a tag to create a tagged search result. The tagged search result may be organized into a public tag collection for sharing and/or exploration of tagged search results by other users. The tagged search result may be organized into a personal tag collection for later access by the user from any device. Because the tagged search result may be indicative of an interest of the user, targeted content associated with the tagged search result may be provided to the user.10-30-2014

Patent applications by Sarthak Deepak Shah, Kirkland, WA US

Saurabh B. Shah, Pullman, WA US

Patent application numberDescriptionPublished
20120063039SYSTEMS AND METHODS FOR PROTECTION OF COMPONENTS IN ELECTRICAL POWER DELIVERY SYSTEMS - Various embodiments disclosed herein provide protection to monitored equipment at both a local level and a system level, in order to offer more comprehensive protection. In one particular embodiment, the protected equipment may include one or more generators. The protection system may utilize time-synchronized data in order to analyze data provided by systems having disparate sampling rates, that are monitored by different equipment, and/or equipment that is geographically separated. Various embodiments may be configured to utilize a variety of sampling rates.03-15-2012
20140359351SYSTEMS AND METHODS FOR PROTECTION OF COMPONENTS IN ELECTRICAL POWER DELIVERY SYSTEMS - Various embodiments disclosed herein provide protection to monitored equipment at both a local level and a system level, in order to offer more comprehensive protection. In one particular embodiment, the protected equipment may include one or more generators. The protection system may utilize time-synchronized data in order to analyze data provided by systems having disparate sampling rates, that are monitored by different equipment, and/or equipment that is geographically separated. Various embodiments may be configured to utilize a variety of sampling rates.12-04-2014

Shital Shah, Snoqualmie, WA US

Patent application numberDescriptionPublished
20120078996Polling Protocol for Automatic Load Limiting - A client-specific or client-independent polling interval is provided to each client dynamically based on server load. The polling interval can be provided in the server polling response sent in response to a client polling request. The polling interval can be determined using a feedback control system or using a Bucket Reservation Method. The server uses a next polling interval and a flag that indicates if the previous polling request was ignored. Using these two parameters the server can continuously control the polling frequency from the client to achieve optimal performance.03-29-2012
20130332516POLLING PROTOCOL FOR AUTOMATIC LOAD LIMITING - A client-specific or client-independent polling interval is provided to each client dynamically based on server load. The polling interval can be provided in the server polling response sent in response to a client polling request. The polling interval can be determined using a feedback control system or using a Bucket Reservation Method. The server uses a next polling interval and a flag that indicates if the previous polling request was ignored. Using these two parameters the server can continuously control the polling frequency from the client to achieve optimal performance.12-12-2013

Shon Shah, Redmond, WA US

Patent application numberDescriptionPublished
20100318827ENERGY USE PROFILING FOR WORKLOAD TRANSFER - Embodiments of energy profiling for workload transfer are disclosed. In accordance with at least one embodiment, the energy profiling for workload transfer includes determining a baseline wattage of a first server. Further, a load wattage of a workload is derived using a difference between the baseline wattage consumption and an overall wattage consumption. The workload is transferred to a second server when the load wattage is less than an available wattage on the second server.12-16-2010

Shon K. Shah, Redmond, WA US

Patent application numberDescriptionPublished
20110225275EFFECTIVELY MANAGING CONFIGURATION DRIFT - Configuration drift refers to changes made over time that cause a computer or service to deviate from a desired configuration. Configuration drift of a group of machines can be managed by defining configuration intent. Intent is defined by defining a configuration baseline comprised of a collection of related configuration rules. Configuration rules include settings, and targets which can be any managed entity that enables reporting of non-compliance at a more granular level. A configuration baseline can be completed by reading configuration rules from one or more well-configured computers. Configuration drift is assessed by comparing actual values to the configuration baseline values and is reported at a managed entity level instead of at a machine level. Remediation, returning the computer to a state of compliance with the configuration baseline, can be performed on demand. Remediations performed over time are retained and applied to a new instance of the service to eliminate configuration drift on the new instance.09-15-2011

Shon Kiran Shah, Redmond, WA US

Patent application numberDescriptionPublished
20120246738Resource Sharing and Isolation in Role Based Access - The subject disclosure is directed towards resource sharing and/or isolation in a role based access (RBA) system. A resource may be associated with an owner, via an owner property, which provides isolation by enforcing exclusive access to that resource by the owner (unless the owner chooses to share). Sharing is provided by allowing the owner to identify, in a GrantedTo list, selected receiving user(s) or user role(s) that can have shared access. Also described is administrator-level control over the ability to share resources and/or receive shared resources, e.g., an administrator selects whether a resource owner is permitted to share resources and/or whether receiving users/user roles are permitted to receive shared resources.09-27-2012

Siddharth R. Shah, Bothell, WA US

Patent application numberDescriptionPublished
20110016471Balancing Resource Allocations Based on Priority - Balancing resource allocations based on priority may be provided. First, a plurality of repositories may be divided into at least two categories. Next, a first portion of computing resources may be dedicated to a first one of the at least two categories. Then a second portion of the computing resources may be dedicated to a second one of the at least two categories. A crawl may then be performed on the plurality of repositories with the computing resources.01-20-2011
20130111559Intelligent Caching for Security Trimming05-02-2013

Siddharth Rajendra Shah, Bothell, WA US

Patent application numberDescriptionPublished
20100191707TECHNIQUES FOR FACILITATING COPY CREATION - Various techniques are disclosed for creating a snapshot of application data. A snapshot is taken by pausing parts of the application over time. Modifications are paused to a first part of data and the first part is copied into a snapshot. After the first part has finished copying, modifications are paused to remaining data, and the remaining data is copied. The application is unpaused. A snapshot can be taken by unpausing parts of the application over time. Modifications to data in an application are paused. A first part of data is copied, and after the first part has finished copying, modifications to the first part are unpaused. The final part of data is copied, and after the final part has finished copying, modifications to the final part are unpaused. Techniques for creating a snapshot of data residing in multiple locations are described.07-29-2010
20110125726SMART ALGORITHM FOR READING FROM CRAWL QUEUE - A smart algorithm for processing transaction from a crawl queue. If the crawler has in memory a predetermined number of URLs for a given host, the crawler reads from the crawl queue URLs from other hosts. As a result the crawler processes multiple hosts concurrently, and thus, uses machine resources more effectively and efficiently to process the URLs. The smart algorithm can further consider other criteria in deciding which URLs to read from the queue. These criteria can include the response time for each repository (host) the crawler processes. Additionally, the crawler can allocate its resources according to content groups (e.g., two pools), one group for faster content delivery and the second group one for slower content delivery. Thus, crawler resources can be partitioned or divided across different pools depending on repository response time. Other criteria can be provided and considered as well.05-26-2011
20110179427Web Services Access to Content Items Stored by Collaboration Systems - A computing system receives a web services request to invoke a method of web Application Programming Interface (API). In response to receiving the web services request, the computing system invokes a method of a language-dependent API of a client component in a collaboration system. The client component communicates with a collaboration server component in the collaboration system using a proprietary communications protocol. The method of the language-dependent API is a method to obtain data from the collaboration server component. After invoking the method, the computing system sends a web services response whose contents depend on the data obtained from the collaboration server component.07-21-2011
20120254118RECOVERY OF TENANT DATA ACROSS TENANT MOVES - A history of locations of tenant data is maintained. The tenant data comprises data that is currently being used by the tenant and the corresponding backup data. When a tenant's data is changed from one location to another, a location and a time is stored within the history that may be accessed to determine a location of the tenant's data at a specified time. Different operations trigger a storing of a location/time within the history. Generally, an operation that changes a location of the tenant's data triggers the storing of the location within the history (e.g. upgrade of farm, move of tenant, adding a tenant, load balancing of the data, and the like). When tenant data is needed for an operation (e.g. restore), the history may be accessed to determine the location of the data.10-04-2012
20120310887AUTOMATIC CONFIGURATION OF A RECOVERY SERVICE - A secondary location is configured as a recovery service for a primary location of the service. The secondary location is maintained in a warm state that is configured to replace the primary location in a case of a failover. During normal operation, the secondary location is automatically updated to reflect a current state of the primary location that is actively servicing user load. Content changes to the primary location are automatically reflected to the secondary location. System changes applied to the primary location are automatically applied to the secondary location. For example, removing/adding machines, updating machine/role assignments, removing adding/database are automatically applied to the secondary location such that the secondary location substantially mirrors the primary location. After a failover to the secondary location, the secondary location becomes the primary location and begins to actively service the user load.12-06-2012
20120310912CRAWL FRESHNESS IN DISASTER DATA CENTER - Content that is stored at a secondary location for a service is crawled before it is placed in operation to assist in maintaining an up to date search index. The content that is crawled at the secondary location includes content that is obtained from the primary location of the service. When a crawler at the secondary location attempts to access content that is stored at the primary location, the crawler is directed to access the corresponding copy of the content that is stored at the secondary location instead of accessing the content at the primary location. The content may be crawled at the secondary location at different times, such as when the information is updated, according to a schedule, and the like.12-06-2012
20120311375REDIRECTING REQUESTS TO SECONDARY LOCATION DURING TEMPORARY OUTAGE - During an outage at a primary location for an online service that is temporary in duration (e.g. a “temporary outage”), requests are temporarily switched from the primary location to a secondary location for the online service. The temporary outage may be caused by many different reasons (e.g. power outage, planned maintenance, and the like). The secondary location may be configured as read only during the temporary outage such that users are still able to access their data during the temporary without causing changes to be made to the data. The requests to the primary location of the online service are automatically redirected to be handled by the secondary location. When the temporary outage ends, the requests are automatically switched back to the primary location.12-06-2012
20120311376RECOVERY SERVICE LOCATION FOR A SERVICE - A secondary location of a network acts as a recovery network for a primary location of the service. The secondary location is maintained in a warm state that is configured to replace the primary location in a case of a failover. During normal operation, the primary location actively services user load and performs backups that include full backups, incremental backups and transaction logs that are automatically replicated to the secondary location. Information is stored (e.g. time, retry count) that may be used to assist in determining when the backups are restored correctly at the secondary location. The backups are restored and the transaction logs are replayed at the secondary location to reflect changes (content and administrative) that are made to the primary location. After failover to the secondary location, the secondary location becomes the primary location and begins to actively service the user load.12-06-2012
20120311377REPLAYING JOBS AT A SECONDARY LOCATION OF A SERVICE - Jobs submitted to a primary location of a service within a period of time before and/or after a fail-over event are determined and are resubmitted to a secondary location of the service. For example, jobs that are submitted fifteen minutes before the fail-over event and jobs that are submitted to the primary network before the fail-over to the second location is completed are resubmitted at the secondary location. After the fail-over event occurs, the jobs are updated with the secondary network that is taking the place of the primary location of the service. A mapping of job input parameters (e.g. identifiers and/or secrets) from the primary location to the secondary location are used by the jobs when they are resubmitted to the secondary location. Each job determines what changes are to be made to the job request based on the job being resubmitted.12-06-2012
20140222902WEB SERVICES ACCESS TO CONTENT ITEMS STORED BY COLLABORATION SYSTEMS - A computing system receives a web services request to invoke a method of web Application Programming Interface (API). In response to receiving the web services request, the computing system invokes a method of a language-dependent API of a client component in a collaboration system. The client component communicates with a collaboration server component in the collaboration system using a proprietary communications protocol. The method of the language-dependent API is a method to obtain data from the collaboration server component. After invoking the method, the computing system sends a web services response whose contents depend on the data obtained from the collaboration server component.08-07-2014
20150039931REPLAYING JOBS AT A SECONDARY LOCATION OF A SERVICE - Jobs submitted to a primary location of a service within a period of time before and/or after a fail-over event are determined and are resubmitted to a secondary location of the service. For example, jobs that are submitted fifteen minutes before the fail-over event and jobs that are submitted to the primary network before the fail-over to the second location is completed are resubmitted at the secondary location. After the fail-over event occurs, the jobs are updated with the secondary network that is taking the place of the primary location of the service. A mapping of job input parameters (e.g. identifiers and/or secrets) from the primary location to the secondary location are used by the jobs when they are resubmitted to the secondary location. Each job determines what changes are to be made to the job request based on the job being resubmitted.02-05-2015

Patent applications by Siddharth Rajendra Shah, Bothell, WA US

Smiral Shah, Redmond, WA US

Patent application numberDescriptionPublished
20110270795RESOURCE CAPACITY MONITORING AND REPORTING - Embodiments provide capacity estimates for components of a computing environment, but are not so limited. In an embodiment, a computer-implemented method includes using residual capacity estimates and smooth averages to provide point-in-time capacity estimates for resources of a computing environment. In one embodiment, a computing environment includes a capacity manager that can operate under processor control to provide capacity estimates for a collection of resources as part of a capacity monitoring and planning process. Other embodiments are included and available.11-03-2011

Viral Shah, Bothel, WA US

Patent application numberDescriptionPublished
20120290445DELEGATED APPLICATION AUTHORIZATION WITH INLINE PURCHASE - Methods, systems, and computer program products are provided for delegating authorization to applications to access resources. An application operates in a computing device of a user. The user is navigated from the application to an authorization interface in response to the application determining a need for a resource of a resource repository. The user is enabled to register with the resource repository if the user is determined to not be registered with the resource repository. A resource available at the resource repository designated to be used in the application is determined The user is enabled to purchase a subscription to the resource if the user is determined to not have a subscription to the resource. The application is authorized to use the resource. The user is navigated back to the application. The application is enabled to use the resource associated with the subscription.11-15-2012

Vishrut Shah, Seattle, WA US

Patent application numberDescriptionPublished
20120124001INCREASING DATABASE AVAILABILITY DURING FAULT RECOVERY - Embodiments are directed to providing database access during database reconfiguration and to maintaining replication connections during database reconfiguration. In an embodiment, a computer system establishes multiple quorum sets of replicas to replicate the data of a data partition. The quorum sets of replicas ensure that at least a minimum number of replicas are operating to commit pending transactions during partition reconfiguration. The computer system determines that a data partition reconfiguration has been initiated and provides access to the data partition's data during reconfiguration of the data partition using at least a quorum of replicas in each of the quorum sets of replicas.05-17-2012
Website © 2015 Advameg, Inc.