About
Articles by Rohan
Activity
-
I'm excited to join Rohan Kumar and Microsoft's Data Security, Compliance, Governance, and Privacy team as Chief of Staff. Special thanks to…
I'm excited to join Rohan Kumar and Microsoft's Data Security, Compliance, Governance, and Privacy team as Chief of Staff. Special thanks to…
Liked by Rohan Kumar
-
What an incredible start to RSAC 2025. It was a privilege to join my fellow Microsoft Security leaders at our Pre-Day event to discuss emerging…
What an incredible start to RSAC 2025. It was a privilege to join my fellow Microsoft Security leaders at our Pre-Day event to discuss emerging…
Liked by Rohan Kumar
-
🌟 We’re Hiring: Sr HR Business Partner Extraordinaire! 🌟Are you a skilled HR professional looking for your next career adventure? Do you want to…
🌟 We’re Hiring: Sr HR Business Partner Extraordinaire! 🌟Are you a skilled HR professional looking for your next career adventure? Do you want to…
Liked by Rohan Kumar
Experience & Education
Patents
-
Managing a binary object in a database system
Issued USPTO 08332432
A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second…
A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol.
-
Remote storage and management of binary object data
Issued USPTO 08250102
Embodiments described herein are directed to the accessing remotely stored binary object data in a binary object store. In one embodiment, a computer system receives a request for a portion of binary object data, sends a query to a database server requesting access to the binary object data, and receives a binary object reference. The binary object reference includes binary object identification data and use characteristics specific to the binary object store. The computer system sends a binary…
Embodiments described herein are directed to the accessing remotely stored binary object data in a binary object store. In one embodiment, a computer system receives a request for a portion of binary object data, sends a query to a database server requesting access to the binary object data, and receives a binary object reference. The binary object reference includes binary object identification data and use characteristics specific to the binary object store. The computer system sends a binary object data access request based on the binary object reference to the binary object store using a binary object store interface, and receives the binary object data corresponding to the binary object data access request. The binary object data comprises a portion of data files. The computer system also sends the received binary object data to the user.
-
User mode file system serialization and reliability
Issued USPTO 08156507
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components (SIAC) and one or more set-based access components (SBAC). An interface component is employed by the agent component to process kernel mode requests from a user mode application when communicating with a storage platform. Re-try components can be provided to facilitate cooperation between the SIAC and the SBAC.
-
Multi-protocol access to files and directories
Issued USPTO 07716247
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access conflicts between the single-item access components and the set-based access components.
-
Protocol-independent client-side caching system and method
Issued USPTO 07349943
A system and method that automatically and transparently handle client-side caching of network file data, independent of any remote file handling protocol. A protocol-independent client-side caching mechanism is inserted as a service that handles file-related requests directed to a network, and attempts to satisfy the requests via a client-side caching persistent store. By way of pre-process and post-process calls on a file create request, the caching mechanism creates file-related data…
A system and method that automatically and transparently handle client-side caching of network file data, independent of any remote file handling protocol. A protocol-independent client-side caching mechanism is inserted as a service that handles file-related requests directed to a network, and attempts to satisfy the requests via a client-side caching persistent store. By way of pre-process and post-process calls on a file create request, the caching mechanism creates file-related data structures, and overwrites the information in those structures that a buffering service uses to call back to a network redirector, whereby the client-side caching mechanism inserts itself into the communication flow between the network redirector and the buffering service. Once in the flow of communication, network-directed file read and write requests may be transparently handled by the client-side caching mechanism when appropriate, yet the redirector may be instructed to communicate with the server when needed to satisfy the request.
More activity by Rohan
-
What a day. Happy 50th birthday, Microsoft. Cheers to everyone who’s made this place so special—and here’s to all the people, ideas, and innovation…
What a day. Happy 50th birthday, Microsoft. Cheers to everyone who’s made this place so special—and here’s to all the people, ideas, and innovation…
Liked by Rohan Kumar
-
I'm eternally grateful to Bill and Steve and to Paul for what you've meant to me personally and the vision you had to build this extraordinary…
I'm eternally grateful to Bill and Steve and to Paul for what you've meant to me personally and the vision you had to build this extraordinary…
Liked by Rohan Kumar
-
Thrilled to have been part of Microsoft Tech Connect 2025 in Seattle and catching Rohan Kumar's keynote on Purview, in-person! Purview secures…
Thrilled to have been part of Microsoft Tech Connect 2025 in Seattle and catching Rohan Kumar's keynote on Purview, in-person! Purview secures…
Liked by Rohan Kumar
-
Just in time for test-time scaling, we have our first NVlink 72 clusters live in Azure. Here’s to the next generation of AI built on these systems!
Just in time for test-time scaling, we have our first NVlink 72 clusters live in Azure. Here’s to the next generation of AI built on these systems!
Liked by Rohan Kumar
-
2024 took a village. Our team has spent the past 12 months pouring our hearts and souls into the creation of Microsoft Purview #DataGovernance. We…
2024 took a village. Our team has spent the past 12 months pouring our hearts and souls into the creation of Microsoft Purview #DataGovernance. We…
Liked by Rohan Kumar
-
It was a pleasure speaking with the amazing Jim Cramer last week about the ever-evolving cybersecurity landscape and how our team at Microsoft is…
It was a pleasure speaking with the amazing Jim Cramer last week about the ever-evolving cybersecurity landscape and how our team at Microsoft is…
Liked by Rohan Kumar
-
Over the US thanksgiving weekend, yesterday (Nov 29th) marked the completion of my 25th year at Microsoft. It has been wonderful journey of learning…
Over the US thanksgiving weekend, yesterday (Nov 29th) marked the completion of my 25th year at Microsoft. It has been wonderful journey of learning…
Liked by Rohan Kumar
-
"In the age of AI, data governance takes an even more central role", "MS Purview is the product for the conference" Satya Nadella kicked off…
"In the age of AI, data governance takes an even more central role", "MS Purview is the product for the conference" Satya Nadella kicked off…
Liked by Rohan Kumar
-
Purview Data Governance is at #MSIgnite 2024! If you're here, I'd love to see you at our session BRK327 - Secure and govern your data in the era of…
Purview Data Governance is at #MSIgnite 2024! If you're here, I'd love to see you at our session BRK327 - Secure and govern your data in the era of…
Liked by Rohan Kumar
-
Congratulations to the entire team who worked on launching so many new capabilities for Microsoft Purview today! 🎉 The customer focus and pace of…
Congratulations to the entire team who worked on launching so many new capabilities for Microsoft Purview today! 🎉 The customer focus and pace of…
Liked by Rohan Kumar
-
#MSIgnite 2024 in Chicago, it’s going to be an AWESOME week of new #Purview innovation announcements and connecting with customers on…
#MSIgnite 2024 in Chicago, it’s going to be an AWESOME week of new #Purview innovation announcements and connecting with customers on…
Liked by Rohan Kumar
-
It's going to be an exciting week at #MicrosoftIgnite Looking forward to an impressive lineup of sessions on #MicrosoftSecurity for AI workloads…
It's going to be an exciting week at #MicrosoftIgnite Looking forward to an impressive lineup of sessions on #MicrosoftSecurity for AI workloads…
Liked by Rohan Kumar
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Rohan Kumar in United States
-
Rohan Kumar
Senior Data Engineer | Google Cloud Professional Data Engineer | AWS Certified Solutions Architect | GCP, AWS, Big Data, PySpark, Python, ETL Pipelines | Real-Time Data Solutions | Data Architect
-
Rohan Kumar
Statistics and Computer Science @ University of Illinois Urbana-Champaign | Prev. Software Engineering Intern @ Relativity
-
Rohan Kumar
-
Rohan Kumar
MSCS Grad @ SJSU | SWE @ Snowflake, ex-Span.IO, Instawork, Eightfold.ai | BITS CS' 21 | Expertise in Distributed Systems and LLMs
196 others named Rohan Kumar in United States are on LinkedIn
See others named Rohan Kumar