Patents by Inventor Gaurav Chhaunker
Gaurav Chhaunker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140055260Abstract: Vehicle horn functions are implemented by deriving a current value associated with a component defined by a policy, retrieving from a data file a volume setting mapped to the current value, and modifying operation of a horn in a vehicle to produce a volume corresponding to the volume setting when an operator of the vehicle activates the horn.Type: ApplicationFiled: September 5, 2012Publication date: February 27, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gaurav Chhaunker, John G. Musial, Sandeep R. Patil, Gandhi Sivakumar
-
Patent number: 8660616Abstract: A mobile communications device includes a computer processor and logic executable by the computer processor. The logic is configured to implement a method. The method includes calculating a decibel level of ambient noise. In response to receiving an incoming call from a calling device, and prior to activating a ringtone on the mobile communications device, the method includes determining that the decibel level exceeds a threshold value, and sending an automated response to the calling device in lieu of connecting the call to the mobile communications device.Type: GrantFiled: August 20, 2012Date of Patent: February 25, 2014Assignee: International Business Machines CorporationInventors: Gaurav Chhaunker, John G. Musial, Sandeep R. Patil, Husein Shamshudin
-
Publication number: 20140051404Abstract: A mobile communications device includes a computer processor and logic executable by the computer processor. The logic is configured to implement a method. The method includes calculating a decibel level of ambient noise. In response to receiving an incoming call from a calling device, and prior to activating a ringtone on the mobile communications device, the method includes determining that the decibel level exceeds a threshold value, and sending an automated response to the calling device in lieu of connecting the call to the mobile communications device.Type: ApplicationFiled: August 20, 2012Publication date: February 20, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gaurav Chhaunker, John G. Musial, Sandeep R. Patil, Husein Shamshudin
-
Publication number: 20140051405Abstract: Ambient sound-based call functions include calculating, via a computer processor on a mobile communications device, a decibel level of ambient noise. In response to receiving an incoming call from a calling device, and prior to activating a ringtone on the mobile communications device, the ambient sound-based call functions include determining that the decibel level exceeds a threshold value, and sending an automated response to the calling device in lieu of connecting the call to the mobile communications device.Type: ApplicationFiled: August 27, 2012Publication date: February 20, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gaurav Chhaunker, John G. Musial, Sandeep R. Patil, Husein Shamshudin
-
Publication number: 20130325802Abstract: An application programming interface (API), functioning as an interface between a storage controller and an owning application, is used to migrate, from a specified source LUN to a specified target LUN, at least one specified sub-LUN data chunk, the at least one specified sub-LUN data chunk having a predefined chunk size fixed by the storage controller. A specified total migration size is incrementally reduced by each completed migration of the at least one specified sub-LUN data chunk until the total migration size is zero and the migration is completed.Type: ApplicationFiled: March 13, 2013Publication date: December 5, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pankaj S. BAVISHI, Gaurav CHHAUNKER, Carl E. JONES, Pankaj O. KHANDELWAL, Subhojit ROY
-
Publication number: 20130326182Abstract: A source code-based specification is implemented for use as an interface between a storage controller and an owning application to migrate a specified size of data from physical storage behind the LUN to a new physical location.Type: ApplicationFiled: May 29, 2012Publication date: December 5, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pankaj S. BAVISHI, Gaurav CHHAUNKER, Carl Evan JONES, Pankaj Omprakash KHANDELWAL, Subhojit ROY
-
Publication number: 20130326546Abstract: An application programming interface (API), functioning as an interface between a storage controller and an owning application, is used to migrate, from a specified source LUN to a specified target LUN, at least one specified sub-LUN data chunk, the at least one specified sub-LUN data chunk having a predefined chunk size fixed by the storage controller. A specified total migration size is incrementally reduced by each completed migration of the at least one specified sub-LUN data chunk until the total migration size is zero and the migration is completed.Type: ApplicationFiled: May 29, 2012Publication date: December 5, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pankaj S. BAVISHI, Gaurav CHHAUNKER, Carl Evan JONES, Pankaj Omprakash KHANDELWAL, Subhojit ROY
-
Publication number: 20130326545Abstract: An application programming interface (API) is used to migrate, from a specified source LUN to a specified target LUN, at least one specified sub-LUN data chunk, the API functioning as an interface between a storage controller and an owning application.Type: ApplicationFiled: May 29, 2012Publication date: December 5, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pankaj S. BAVISHI, Gaurav CHHAUNKER, Pankaj Omprakash KHANDELWAL, Subhojit ROY, Carl Evan JONES
-
Publication number: 20130246357Abstract: A method includes receiving a request to save a first file as immutable. The method also includes searching for a second file that is saved and is redundant to the first file. The method further includes determining the second file is one of mutable and immutable. When the second file is mutable, the method includes saving the first file as a master copy, and replacing the second file with a soft link pointing to the master copy. When the second file is immutable, the method includes determining which of the first and second files has a later expiration date and an earlier expiration date, saving the one of the first and second files with the later expiration date as a master copy, and replacing the one of the first and second files with the earlier expiration date with a soft link pointing to the master copy.Type: ApplicationFiled: May 10, 2013Publication date: September 19, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gaurav CHHAUNKER, Bhushan P. JAIN, Sandeep R. PATIL, Sri RAMANTHAN, Matthew B. TREVATHAN
-
Publication number: 20130232179Abstract: An embodiment of the invention provides a method for storage management in a cloud computing system. More specifically, locations of storage components in the cloud computing system and storage properties of the storage components are identified. The storage properties include the amount of available storage space and/or the cost of storage space. A storage quota for a user of the cloud computing system is generated with a cloud quota management module based on the locations of the storage components and/or the storage properties of the storage components. In at least one embodiment, the storage quota includes the maximum amount of storage allocated to the user in at least one of the storage components.Type: ApplicationFiled: March 2, 2012Publication date: September 5, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gaurav Chhaunker, Umesh P. Gaikwad, Sandeep R. Patil, Gandhi Sivakumar
-
Patent number: 8468138Abstract: A method includes receiving a request to save a first file as immutable. The method also includes searching for a second file that is saved and is redundant to the first file. The method further includes determining the second file is one of mutable and immutable. When the second file is mutable, the method includes saving the first file as a master copy, and replacing the second file with a soft link pointing to the master copy. When the second file is immutable, the method includes determining which of the first and second files has a later expiration date and an earlier expiration date, saving the one of the first and second files with the later expiration date as a master copy, and replacing the one of the first and second files with the earlier expiration date with a soft link pointing to the master copy.Type: GrantFiled: December 2, 2011Date of Patent: June 18, 2013Assignee: International Business Machines CorporationInventors: Gaurav Chhaunker, Bhushan P. Jain, Sandeep R. Patil, Sri Ramanathan, Matthew B. Trevathan
-
Publication number: 20130144846Abstract: A method includes receiving a request to save a first file as immutable. The method also includes searching for a second file that is saved and is redundant to the first file. The method further includes determining the second file is one of mutable and immutable. When the second file is mutable, the method includes saving the first file as a master copy, and replacing the second file with a soft link pointing to the master copy. When the second file is immutable, the method includes determining which of the first and second files has a later expiration date and an earlier expiration date, saving the one of the first and second files with the later expiration date as a master copy, and replacing the one of the first and second files with the earlier expiration date with a soft link pointing to the master copy.Type: ApplicationFiled: December 2, 2011Publication date: June 6, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gaurav CHHAUNKER, Bhushan P. JAIN, Sandeep R. PATIL, Sri RAMANATHAN, Matthew B. TREVATHAN
-
Publication number: 20130097399Abstract: A computational device receives a request to copy a source logical block of a thin provisioned source logical unit to a target logical block of a thin provisioned target logical unit, wherein in thin provisioned logical units physical storage space is allocated in response to a write operation being performed but not during creation of the thin provisioned logical units. The computational device generates metadata that stores a correspondence between the source logical block and the target logical block, while avoiding allocating any physical storage space for the target logical block in the thin provisioned target logical unit.Type: ApplicationFiled: October 17, 2011Publication date: April 18, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gaurav Chhaunker, Subhojit Roy
-
Publication number: 20130086316Abstract: Physical storage devices are configured as a redundant array of independent disks (RAID). As such, storage space of the physical storage devices is allocated to the RAID, and each physical storage device is part of the RAID. Where a portion of the storage space of the physical storage devices is not allocated to the RAID, this portion of the storage space from a mixed drive capacity is configured so that it is usable and is not wasted.Type: ApplicationFiled: October 1, 2011Publication date: April 4, 2013Inventors: Dhaval K. Shah, Ganesh Sivaperuman, Gaurav Chhaunker, Muthu A. Muthiah
-
Patent number: 8387869Abstract: A device, a system, and methods of securing an authentication device are disclosed. A security system includes an authentication device configured for transmitting a second signal to deactivate the authentication device, in response to receiving a first signal. The authentication device further includes a receiver, a transmitter, an activation device, and a power source, and wherein the second signal includes a unique identifier of the authentication device. The security system further includes an authentication device reader configured for receiving the second signal from the authentication device, extracting the unique identifier from the second signal, and transmitting the extracted unique identifier.Type: GrantFiled: December 24, 2009Date of Patent: March 5, 2013Assignee: International Business Machines CorporationInventors: Dhaval K. Shah, Gaurav Chhaunker, Vikram B. Sanap
-
Publication number: 20110155802Abstract: A device, a system, and methods of securing an authentication device are disclosed. A security system includes an authentication device configured for transmitting a second signal to deactivate the authentication device, in response to receiving a first signal. The authentication device further includes a receiver, a transmitter, an activation device, and a power source, and wherein the second signal includes a unique identifier of the authentication device. The security system further includes an authentication device reader configured for receiving the second signal from the authentication device, extracting the unique identifier from the second signal, and transmitting the extracted unique identifier.Type: ApplicationFiled: December 24, 2009Publication date: June 30, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dhaval K. Shah, Gaurav Chhaunker, Vikram B. Sanap