11
Samiullah Mohammed, Aseem Vaid: Generating and interpreting secure and system dependent software license keys. NetApp, Cesari and McKenna, September 28, 2010: US07805616 (21 worldwide citation)

A technique is provided for generating and interpreting secure and system dependent software license keys. According to one or more embodiments of the present invention, a device executing an encoding algorithm may generate a software license key by applying several layers of security. Illustrativel ...


12
Gokul Nadathur, Aseem Vaid: System and method for automatic scheduling and policy provisioning for information lifecycle management. NetApp, Cesari and McKenna, April 16, 2013: US08423731 (11 worldwide citation)

A system and method for managing automatic data protection features, e.g., backup scheduling and data storage capabilities, e.g., policy provisioning of a storage system to enable information lifecycle management of data served by the system. A novel management module executes within a storage opera ...


13
Gokul S Nadathur, Aseem Vaid: Removable portable data backup for a network storage system. Network Appliance, Blakely Sokoloff Taylor & Zafman, November 11, 2008: US07451286 (5 worldwide citation)

A storage server creates a first mirror of a primary volume of data on a first storage set that includes at least one disk and creates a second mirror of the primary volume, on a second storage set that also includes at least one disk. The server then quiesces the second storage set. A user then dec ...


14
Gokul Nadathur, Samiullah Mohammed, Aseem Vaid: System and method for differentiated cross-licensing for services across heterogeneous systems using transient keys. NetApp, Cesari and McKenna, October 11, 2011: US08037524

A system and method for guard point licensing is provided. Licensed software executing on a storage system is modified to include one or more guard points to ensure that appropriate licenses have been obtained by a customer. During initialization of a guard point, a management system obtains a first ...


15
Aseem Vaid, Rajesh Rajashekar, Ronghuei A Su, Rimple Patel: Method and apparatus for application-driven storage provisioning on a unified network storage system. Network Appliance, Blakely Sokoloff Taylor & Zafman, November 22, 2011: US08065398

A configuration for a network-accessible storage device is prepared by automatically computing a configuration parameter based on a setup parameter that pertains to an application-level function of the network accessible device. Software and systems that implement or use aspects of the invention are ...


16
Ganesan Chandrashekhar, Sanjay Sawhney, Hemant Puri, Aseem Vaid, Dharmesh Shah: Method and system for transparent encryption and authentication of file data protocols over internet protocol. NeoScale Systems, Townsend And Townsend And Crew, February 10, 2005: US20050033988-A1

A method processing one or more files using a security application. The method includes a method processing one or more files using a security application. The method includes connecting the client to a proxy server, which is coupled to one or more NAS servers. The method includes requesting for a f ...


17
Kumar Sundararajan, Dharmesh Shah, Sanjay Sawhney, Atul Pandit, Aseem Vaid, Richard Moeller: Method and system for stateful storage processing in storage area networks. NeoScale Systems, Townsend And Townsend And Crew, February 24, 2005: US20050041812-A1

A system (and methods) for performing a service operation on a Fibre Channel or other like channels. The system has an interface coupled to a Fibre Channel. A classifier is coupled to the interface. The classifier is adapted to receive an initiator frame from the interface. The classifier is adapted ...


18
Gokul S Nadathur, Aseem Vaid: Removable portable data backup for a network storage system. Network Appliance, Network Appliance Blakely, January 24, 2008: US20080022058-A1

A storage server creates a first mirror of a primary volume of data on a first storage set that includes at least one disk and creates a second mirror of the primary volume, on a second storage set that also includes at least one disk. The server then quiesces the second storage set. A user then dec ...


19
Aseem Vaid, Rajesh Rajashekar, Ronghuei A Su, Rimple Patel: Method and apparatus for application-driven storage provisioning on a unified network storage system. Network Appliance, Network Appliance Bstz, Blakely Sokoloff Taylor & Zafman, September 25, 2008: US20080235240-A1

A configuration for a network-accessible storage device is prepared by automatically computing a configuration parameter based on a setup parameter that pertains to an application-level function of the network accessible device. Software and systems that implement or use aspects of the invention are ...


20
Ganesan Chandrashekhar, Sanjay Sawhney, Hemant Puri, Aseem Vaid, Dharmesh Shah: Method and system for transparent encryption and authentication of file data protocols over internet protocol. NeoScale Systems, Fish & Richardson PC, May 7, 2009: US20090119752-A1

A method processing one or more files using a security application. The method includes a method processing one or more files using a security application. The method includes connecting the client to a proxy server, which is coupled to one or more NAS servers. The method includes requesting for a f ...