About
As the Corporate Vice President of Azure Data, Rohan is the engineering leader…
Articles by Rohan
Activity
-
2024 took a village. Our team has spent the past 12 months pouring our hearts and souls into the creation of Microsoft Purview #DataGovernance. We…
2024 took a village. Our team has spent the past 12 months pouring our hearts and souls into the creation of Microsoft Purview #DataGovernance. We…
Liked by Rohan Kumar
-
It was a pleasure speaking with the amazing Jim Cramer last week about the ever-evolving cybersecurity landscape and how our team at Microsoft is…
It was a pleasure speaking with the amazing Jim Cramer last week about the ever-evolving cybersecurity landscape and how our team at Microsoft is…
Liked by Rohan Kumar
-
Over the US thanksgiving weekend, yesterday (Nov 29th) marked the completion of my 25th year at Microsoft. It has been wonderful journey of learning…
Over the US thanksgiving weekend, yesterday (Nov 29th) marked the completion of my 25th year at Microsoft. It has been wonderful journey of learning…
Liked by Rohan Kumar
Experience
Education
Patents
-
Managing a binary object in a database system
Issued USPTO 08332432
A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second…
A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol.
-
Remote storage and management of binary object data
Issued USPTO 08250102
Embodiments described herein are directed to the accessing remotely stored binary object data in a binary object store. In one embodiment, a computer system receives a request for a portion of binary object data, sends a query to a database server requesting access to the binary object data, and receives a binary object reference. The binary object reference includes binary object identification data and use characteristics specific to the binary object store. The computer system sends a binary…
Embodiments described herein are directed to the accessing remotely stored binary object data in a binary object store. In one embodiment, a computer system receives a request for a portion of binary object data, sends a query to a database server requesting access to the binary object data, and receives a binary object reference. The binary object reference includes binary object identification data and use characteristics specific to the binary object store. The computer system sends a binary object data access request based on the binary object reference to the binary object store using a binary object store interface, and receives the binary object data corresponding to the binary object data access request. The binary object data comprises a portion of data files. The computer system also sends the received binary object data to the user.
-
User mode file system serialization and reliability
Issued USPTO 08156507
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components (SIAC) and one or more set-based access components (SBAC). An interface component is employed by the agent component to process kernel mode requests from a user mode application when communicating with a storage platform. Re-try components can be provided to facilitate cooperation between the SIAC and the SBAC.
-
Multi-protocol access to files and directories
Issued USPTO 07716247
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access conflicts between the single-item access components and the set-based access components.
-
Protocol-independent client-side caching system and method
Issued USPTO 07349943
A system and method that automatically and transparently handle client-side caching of network file data, independent of any remote file handling protocol. A protocol-independent client-side caching mechanism is inserted as a service that handles file-related requests directed to a network, and attempts to satisfy the requests via a client-side caching persistent store. By way of pre-process and post-process calls on a file create request, the caching mechanism creates file-related data…
A system and method that automatically and transparently handle client-side caching of network file data, independent of any remote file handling protocol. A protocol-independent client-side caching mechanism is inserted as a service that handles file-related requests directed to a network, and attempts to satisfy the requests via a client-side caching persistent store. By way of pre-process and post-process calls on a file create request, the caching mechanism creates file-related data structures, and overwrites the information in those structures that a buffering service uses to call back to a network redirector, whereby the client-side caching mechanism inserts itself into the communication flow between the network redirector and the buffering service. Once in the flow of communication, network-directed file read and write requests may be transparently handled by the client-side caching mechanism when appropriate, yet the redirector may be instructed to communicate with the server when needed to satisfy the request.
More activity by Rohan
-
"In the age of AI, data governance takes an even more central role", "MS Purview is the product for the conference" Satya Nadella kicked off…
"In the age of AI, data governance takes an even more central role", "MS Purview is the product for the conference" Satya Nadella kicked off…
Liked by Rohan Kumar
-
Purview Data Governance is at #MSIgnite 2024! If you're here, I'd love to see you at our session BRK327 - Secure and govern your data in the era of…
Purview Data Governance is at #MSIgnite 2024! If you're here, I'd love to see you at our session BRK327 - Secure and govern your data in the era of…
Liked by Rohan Kumar
-
Congratulations to the entire team who worked on launching so many new capabilities for Microsoft Purview today! 🎉 The customer focus and pace of…
Congratulations to the entire team who worked on launching so many new capabilities for Microsoft Purview today! 🎉 The customer focus and pace of…
Liked by Rohan Kumar
-
#MSIgnite 2024 in Chicago, it’s going to be an AWESOME week of new #Purview innovation announcements and connecting with customers on…
#MSIgnite 2024 in Chicago, it’s going to be an AWESOME week of new #Purview innovation announcements and connecting with customers on…
Liked by Rohan Kumar
-
It's going to be an exciting week at #MicrosoftIgnite Looking forward to an impressive lineup of sessions on #MicrosoftSecurity for AI workloads…
It's going to be an exciting week at #MicrosoftIgnite Looking forward to an impressive lineup of sessions on #MicrosoftSecurity for AI workloads…
Liked by Rohan Kumar
-
After an incredibly rewarding journey spanning 16 years at Microsoft, it's time for me to start a new adventure. I feel extremely fortunate to have…
After an incredibly rewarding journey spanning 16 years at Microsoft, it's time for me to start a new adventure. I feel extremely fortunate to have…
Liked by Rohan Kumar
-
Purview for AI: It's been a little over a year since the dream team started the journey to paint the vision and execute on securing and governing AI…
Purview for AI: It's been a little over a year since the dream team started the journey to paint the vision and execute on securing and governing AI…
Liked by Rohan Kumar
-
Read our latest blog - by Rohan Kumar - in the series which explores how Microsoft Security is transforming security platforms with practical…
Read our latest blog - by Rohan Kumar - in the series which explores how Microsoft Security is transforming security platforms with practical…
Liked by Rohan Kumar
-
𝗚𝗲𝗻𝗲𝗿𝗮𝗹 𝗔𝘃𝗮𝗶𝗹𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗼𝗳 𝘁𝗵𝗲 𝗻𝗲𝘄 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗣𝘂𝗿𝘃𝗶𝗲𝘄 𝗗𝗮𝘁𝗮 𝗚𝗼𝘃𝗲𝗿𝗻𝗮𝗻𝗰𝗲 𝗦𝗼𝗹𝘂𝘁𝗶𝗼𝗻 On…
𝗚𝗲𝗻𝗲𝗿𝗮𝗹 𝗔𝘃𝗮𝗶𝗹𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗼𝗳 𝘁𝗵𝗲 𝗻𝗲𝘄 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗣𝘂𝗿𝘃𝗶𝗲𝘄 𝗗𝗮𝘁𝗮 𝗚𝗼𝘃𝗲𝗿𝗻𝗮𝗻𝗰𝗲 𝗦𝗼𝗹𝘂𝘁𝗶𝗼𝗻 On…
Liked by Rohan Kumar
-
Recently, I had the pleasure of visiting our DC-area engineering teams and US Federal customer field teams and had the opportunity to see…
Recently, I had the pleasure of visiting our DC-area engineering teams and US Federal customer field teams and had the opportunity to see…
Liked by Rohan Kumar
-
Excited to share that Microsoft Purview Data Governance will be GA on Sept 1st, 2024. This marks a significant milestone for Microsoft Purview in…
Excited to share that Microsoft Purview Data Governance will be GA on Sept 1st, 2024. This marks a significant milestone for Microsoft Purview in…
Liked by Rohan Kumar
-
Today, sharing a haiku about the intersection of data, AI, and cyber, in celebration of the latest Afternoon Cyber Tea episode with Shawn Bice and…
Today, sharing a haiku about the intersection of data, AI, and cyber, in celebration of the latest Afternoon Cyber Tea episode with Shawn Bice and…
Liked by Rohan Kumar
-
Thank you Ann Johnson for inviting Rohan Kumar and I to join you for the latest episode of your Afternoon Cyber Tea Podcast. We loved the discussion,…
Thank you Ann Johnson for inviting Rohan Kumar and I to join you for the latest episode of your Afternoon Cyber Tea Podcast. We loved the discussion,…
Liked by Rohan Kumar
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Rohan Kumar in United States
-
Rohan Kumar
USC MBA I PwC Consultant I Previous Brand Strategy & Partnership Management w/ Russell Wilson
-
Rohan Kumar
-
Rohan K.
-
Rohan Kumar
Biological Sciences and Business Institutions at Northwestern University | Founder of Svasth Co.
185 others named Rohan Kumar in United States are on LinkedIn
See others named Rohan Kumar