About
Articles by Rohan
Activity
-
Today, sharing a haiku about the intersection of data, AI, and cyber, in celebration of the latest Afternoon Cyber Tea episode with Shawn Bice and…
Today, sharing a haiku about the intersection of data, AI, and cyber, in celebration of the latest Afternoon Cyber Tea episode with Shawn Bice and…
Liked by Rohan Kumar
-
Thank you Ann Johnson for inviting Rohan Kumar and I to join you for the latest episode of your Afternoon Cyber Tea Podcast. We loved the discussion,…
Thank you Ann Johnson for inviting Rohan Kumar and I to join you for the latest episode of your Afternoon Cyber Tea Podcast. We loved the discussion,…
Liked by Rohan Kumar
-
This week I completed 1 year at Microsoft! And what a year to be at this incredible company. I had always been at the forefront of #data innovations,…
This week I completed 1 year at Microsoft! And what a year to be at this incredible company. I had always been at the forefront of #data innovations,…
Liked by Rohan Kumar
Experience & Education
Patents
-
Managing a binary object in a database system
Issued USPTO 08332432
A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second…
A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol.
-
Remote storage and management of binary object data
Issued USPTO 08250102
Embodiments described herein are directed to the accessing remotely stored binary object data in a binary object store. In one embodiment, a computer system receives a request for a portion of binary object data, sends a query to a database server requesting access to the binary object data, and receives a binary object reference. The binary object reference includes binary object identification data and use characteristics specific to the binary object store. The computer system sends a binary…
Embodiments described herein are directed to the accessing remotely stored binary object data in a binary object store. In one embodiment, a computer system receives a request for a portion of binary object data, sends a query to a database server requesting access to the binary object data, and receives a binary object reference. The binary object reference includes binary object identification data and use characteristics specific to the binary object store. The computer system sends a binary object data access request based on the binary object reference to the binary object store using a binary object store interface, and receives the binary object data corresponding to the binary object data access request. The binary object data comprises a portion of data files. The computer system also sends the received binary object data to the user.
-
User mode file system serialization and reliability
Issued USPTO 08156507
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components (SIAC) and one or more set-based access components (SBAC). An interface component is employed by the agent component to process kernel mode requests from a user mode application when communicating with a storage platform. Re-try components can be provided to facilitate cooperation between the SIAC and the SBAC.
-
Multi-protocol access to files and directories
Issued USPTO 07716247
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access conflicts between the single-item access components and the set-based access components.
-
Protocol-independent client-side caching system and method
Issued USPTO 07349943
A system and method that automatically and transparently handle client-side caching of network file data, independent of any remote file handling protocol. A protocol-independent client-side caching mechanism is inserted as a service that handles file-related requests directed to a network, and attempts to satisfy the requests via a client-side caching persistent store. By way of pre-process and post-process calls on a file create request, the caching mechanism creates file-related data…
A system and method that automatically and transparently handle client-side caching of network file data, independent of any remote file handling protocol. A protocol-independent client-side caching mechanism is inserted as a service that handles file-related requests directed to a network, and attempts to satisfy the requests via a client-side caching persistent store. By way of pre-process and post-process calls on a file create request, the caching mechanism creates file-related data structures, and overwrites the information in those structures that a buffering service uses to call back to a network redirector, whereby the client-side caching mechanism inserts itself into the communication flow between the network redirector and the buffering service. Once in the flow of communication, network-directed file read and write requests may be transparently handled by the client-side caching mechanism when appropriate, yet the redirector may be instructed to communicate with the server when needed to satisfy the request.
More activity by Rohan
-
🙋 Show your hands if you were at #PASSDataCommunitySummit 2022 to witness this historic moment 🌟. Summit 2022 day 1 started off with a 💥, bringing…
🙋 Show your hands if you were at #PASSDataCommunitySummit 2022 to witness this historic moment 🌟. Summit 2022 day 1 started off with a 💥, bringing…
Liked by Rohan Kumar
-
Yesterday, Rohan Kumar, Microsoft CVP @ Azure Data announced general availability (GA) of SQL Server 2022. Super excited to see our product Azure…
Yesterday, Rohan Kumar, Microsoft CVP @ Azure Data announced general availability (GA) of SQL Server 2022. Super excited to see our product Azure…
Liked by Rohan Kumar
-
#SQLServer2022 is now generally available! Learn more about the latest innovations and their impact with our customers in Rohan Kumar's blog…
#SQLServer2022 is now generally available! Learn more about the latest innovations and their impact with our customers in Rohan Kumar's blog…
Liked by Rohan Kumar
-
Announcing SQL Server 2022 general availability! This newest SQL Server release is the most Azure-enabled version yet, building on its tradition of…
Announcing SQL Server 2022 general availability! This newest SQL Server release is the most Azure-enabled version yet, building on its tradition of…
Liked by Rohan Kumar
-
Wow, it's been a few years since we had an in person PASS Summit. Lots of Great memories. This is one of the most technical, vibrant and special…
Wow, it's been a few years since we had an in person PASS Summit. Lots of Great memories. This is one of the most technical, vibrant and special…
Liked by Rohan Kumar
-
I’m so pumped for the PASS Summit and Rohan Kumar “coming home” party where we will be sharing the continued innovation of SQL and the Microsoft…
I’m so pumped for the PASS Summit and Rohan Kumar “coming home” party where we will be sharing the continued innovation of SQL and the Microsoft…
Liked by Rohan Kumar
-
Today our Corporate Vice President Rohan Kumar announced the general availability of SQL Server 2022 at the PASS Data Community Summit. The journey…
Today our Corporate Vice President Rohan Kumar announced the general availability of SQL Server 2022 at the PASS Data Community Summit. The journey…
Liked by Rohan Kumar
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Rohan Kumar in United States
-
Rohan Kumar
Azure DevOps Lead
-
Rohan Kumar
-
Rohan Kumar
-
Rohan Kumar
SWE Intern @ LiveRamp | CS @ UCSB | Mobile App Developer
-
Rohan Kumar
Senior Consultant at PwC | Customer Experience & Insights
172 others named Rohan Kumar in United States are on LinkedIn
See others named Rohan Kumar