Patents by Inventor Badari Pulavarty
Badari Pulavarty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120260246Abstract: Systems, methods and computer program products may provide software installation on a computer in a computer system. A software installation method may include installing at a server in a computer system a first files package including computer program files for a first software application, the computer system including at least a first computer installed with a first configuration package, the first configuration package including files necessary to configure and register the first software application, receiving a request at the server from the first computer for access to the first files package, and making the first files package available for use by the first computer.Type: ApplicationFiled: April 6, 2011Publication date: October 11, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sukadev Bhattiprolu, Venkateswarara Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N Sharoff
-
Publication number: 20120216057Abstract: Managing delivery of power to one or more hardware memory devices in a computer system. The computer system is configured with a processor and at least two hardware memory devices. A temperature monitor tool is employed to monitor the hardware memory devices. Management of an addressable subset of the hardware memory devices is employed in response to the monitored temperature reading.Type: ApplicationFiled: April 30, 2012Publication date: August 23, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gerrit Huizenga, Vivek Kashyap, Badari Pulavarty, Russell H. Weight
-
Patent number: 8250538Abstract: A system, method and computer program product for optimizing a software system through scenario evaluation. In accordance with the disclosed technique, a request is received for evaluation of an operational scenario that operates over an environment that is a superset of existing system capabilities encompassing system features or parameters that are not available in the currently running system. A knowledge base is consulted to derive recommendations with respect to operating parameters that may be collected to evaluate the scenario, mechanisms for gathering data relating to the parameters, and data evaluator operations for deriving a data evaluation result based on the data gathering. The knowledge base is further consulted to determine a reconfiguration recommendation based on the result. Scenario evaluation is performed based on simulation of the reconfiguration recommendation using the data evaluation result to determine efficacy of the scenario.Type: GrantFiled: June 7, 2008Date of Patent: August 21, 2012Assignee: International Business Machines CorporationInventors: Vivek Kashyap, Gerrit Huizenga, Russell H. Weight, Badari Pulavarty
-
Patent number: 8200999Abstract: Managing delivery of power to one or more hardware memory devices in a computer system. The computer system is configured with a processor and at least two hardware memory devices. An energy exchange threshold for the computer system is set, and management of one or more of the hardware memory devices is employed when the computer system exceeds an energy exchange threshold.Type: GrantFiled: August 11, 2008Date of Patent: June 12, 2012Assignee: International Business Machines CorporationInventors: Gerrit Huizenga, Vivek Kashyap, Badari Pulavarty, Russell H. Weight
-
Publication number: 20120102004Abstract: A digital file may be stored on a storage device and deleted upon reading of the file. In one example, at least a portion of the stored file may be read, such as by a processor. In response to the reading of the stored file, at least part of the at least a portion of the stored file that has been read may be deleted. In further examples, the at least part of the at least a portion of the stored file may be deleted progressively while the stored file is being read, after a triggering event, or after a delay in time. According to another example, a user may provide an indication representative of the at least part of the at least a portion of the stored file that is to be deleted after the at least a portion of the stored file is read.Type: ApplicationFiled: October 22, 2010Publication date: April 26, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alexander C. Johnson, Badari Pulavarty
-
Publication number: 20120102079Abstract: Methods, systems and computer program products are provided that may relate to controlling access to or accessing computer files over a computer network. A file server may execute on a first computer system and a client may execute on a second computer system. The client may be configured to send a first communication to the file server relating to a first computer file stored on the first computer system. The first communication may include first access control data associated with the first computer file. The file server may be configured to receive the first communication and extract the first access control data from the first communication. The file server may then store the extracted first access control data in extended attributes of the first computer file on the first computer system.Type: ApplicationFiled: October 25, 2010Publication date: April 26, 2012Applicant: International Business Machines CorporationInventors: Steven M. French, Venkateswararao Jujjuri, Anthony N. Liguori, Badari Pulavarty, Eric V. Van Hensbergen, Aneesh K. Veetil
-
Publication number: 20120016890Abstract: Systems, methods and computer program products are disclosed herein for assigning visual characteristics to records of a data structure and displaying those records. In response to an attribute being selected, records of the data structure may be sorted by values of the selected attribute of the records. A first set of records having values of the selected attribute that correspond to a first value may be identified. A second set of records having values of the selected attribute that correspond to a second value also may be identified. A first visual characteristic may automatically be assigned to each record of the first set of records and a second visual characteristic, that is different from the first visual characteristic, may be automatically assigned to each record of the second set of records.Type: ApplicationFiled: July 15, 2010Publication date: January 19, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff
-
Publication number: 20110264991Abstract: A method, system, and article for management of email communication content across a computer system network. An archive of email communications is retained on storage media in communication with the network. In addition, email communication is retained on storage media in communication with a client machine in the network. To mitigate duplication of email communications, duplicate communications are replaced with a hyperlink to the archive communication. This replacement supports removal of the duplicate communication from the storage media in communication with the client machine.Type: ApplicationFiled: April 23, 2010Publication date: October 27, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff
-
Publication number: 20100274698Abstract: A method, system, and article are provided for effectively managing a financial account for fraud prevention. The account is provided with a soft credit limit parameter and a tool for management of the soft credit limit parameter. The soft credit limit is in addition to a hard credit limit. More specifically, the hard credit limit is static and fixed by a credit issuing authority. In contrast, the soft credit limit is amendable under different circumstances and in conjunction with the tool is managed by the holder of the account.Type: ApplicationFiled: April 27, 2009Publication date: October 28, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sukadev Bhattiprolu, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff
-
Publication number: 20100054443Abstract: A target phone number previously associated with a first user is presently associated with a second user such that the target phone number is not presently associated with the first user. A caller uses a calling phone number to initiate a phone call to the target phone number. In response, it is determined whether the calling phone number is on a list of phone numbers associated with the first user. If the calling phone number is on the list of phone numbers associated with the first user, then the caller is notified that the target phone number is no longer associated with the first user. It is determined whether the caller wants to continue with the phone call, and if not, the phone call is terminated before it reaches the second user.Type: ApplicationFiled: September 1, 2008Publication date: March 4, 2010Inventors: Sukadev Bhattiprolu, Haren Myneni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff, Malahal R. Naineni
-
Publication number: 20100037073Abstract: Apparatus and Method for Selective Power Reduction of Memory Hardware A method and apparatus are provided for managing delivery of power to one or more hardware memory devices in a computer system. The computer system is configured with a processor and at least two hardware memory devices. An energy exchange threshold for the computer system is set, and management of one or more of the hardware memory devices is employed when the computer system exceeds an energy exchange threshold.Type: ApplicationFiled: August 11, 2008Publication date: February 11, 2010Applicant: International Business Machines CorporationInventors: Gerrit Huizenga, Vivek Kashyap, Badari Pulavarty, Russell H. Weight
-
Publication number: 20090307670Abstract: A system, method and computer program product for optimizing a software system through scenario evaluation. In accordance with the disclosed technique, a request is received for evaluation of an operational scenario that operates over an environment that is a superset of existing system capabilities encompassing system features or parameters that are not available in the currently running system. A knowledge base is consulted to derive recommendations with respect to operating parameters that may be collected to evaluate the scenario, mechanisms for gathering data relating to the parameters, and data evaluator operations for deriving a data evaluation result based on the data gathering. The knowledge base is further consulted to determine a reconfiguration recommendation based on the result. Scenario evaluation is performed based on simulation of the reconfiguration recommendation using the data evaluation result to determine efficacy of the scenario.Type: ApplicationFiled: June 7, 2008Publication date: December 10, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vivek Kashyap, Gerrit Huizenga, Russell H. Weight, Badari Pulavarty
-
Patent number: 7546352Abstract: A method for automatically merging e-mail replies containing reviewer comments to open source software code is disclosed. Individual reply messages may be identified for merger and evaluated for comments for each line of code. Comments, context information, and reviewer information may then be extracted and incorporated into a merged reply message where each line of code commented on contains comments associated with that line of code. The merged reply message may then be transmitted back to the sender with the incorporated comments.Type: GrantFiled: August 15, 2008Date of Patent: June 9, 2009Assignee: International Business Machines CorporationInventors: Sukadev Bhattiprolu, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra S. Seetharaman, Narasimha N. Sharoff