Patents by Inventor Karthik Sivakumar
Karthik Sivakumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10298676Abstract: A method and associated systems for enabling digital asset reuse. Users are each associated with a collection of digital assets and each user and each asset is assigned an eminence value. When a first user initially accesses an asset, the asset is copied to the first user's collection, thus indicating the first user's favorable view of the asset. When a second user accesses the first user's copy, the asset is copied to the second user's collection, and the eminence of the first user and of the asset are increased. If a third user accesses the second user's copy, the asset is copied to the third user's collection and eminence values of the first and second users and of the asset increase. The second user may locate an asset in the first user's collection through means that include the second user's decision to “follow” the first user.Type: GrantFiled: January 20, 2017Date of Patent: May 21, 2019Assignee: International Business Machines CorporationInventors: Anuradha Bhamidipaty, Saiprasad Kolluri Venkata Sesha, Gopal S. Pingali, Mark E. Podlaseck, Karthik Sivakumar
-
Publication number: 20170134484Abstract: A method and associated systems for enabling digital asset reuse. Users are each associated with a collection of digital assets and each user and each asset is assigned an eminence value. When a first user initially accesses an asset, the asset is copied to the first user's collection, thus indicating the first user's favorable view of the asset. When a second user accesses the first user's copy, the asset is copied to the second user's collection, and the eminence of the first user and of the asset are increased. If a third user accesses the second user's copy, the asset is copied to the third user's collection and eminence values of the first and second users and of the asset increase. The second user may locate an asset in the first user's collection through means that include the second user's decision to “follow” the first user.Type: ApplicationFiled: January 20, 2017Publication date: May 11, 2017Inventors: Anuradha Bhamidipaty, Saiprasad Kolluri Venkata Sesha, Gopal S. Pingali, Mark E. Podlaseck, Karthik Sivakumar
-
Patent number: 9628551Abstract: A method and associated systems for reusing digital assets and automatically updating user and asset eminence values associated with each asset reuse. Users each control a collection of digital assets and each user and each asset is assigned an eminence value that represents a relative importance of a user or asset. When a first user accesses an asset, that asset is copied to the first user's collection. When a second user accesses the first user's copy, the asset is copied to the second user's collection, and the eminence of the first user and of the asset are increased. When a third user accesses the second user's copy, the asset is copied to the third user's collection and first-user's, second-user's, and asset's eminence values increase. The second user may automatically locate an asset in the first user's collection by “following” the first user.Type: GrantFiled: June 18, 2014Date of Patent: April 18, 2017Assignee: International Business Machines CorporationInventors: Anuradha Bhamidipaty, Saiprasad Kolluri Venkata Sesha, Gopal S. Pingali, Mark E. Podlaseck, Karthik Sivakumar
-
Patent number: 9614875Abstract: A distributed cloud environment system comprising: a repository; a plurality of cloud managed nodes with a client program interface; a plurality of service management components with a service management component interface; a central trusted computing platform service in communication with the repository, the plurality of cloud managed nodes and the plurality of service management components, comprising: a first interface for communication with the client program interface in each of the plurality of cloud managed nodes through a first single touch point; and a second interface for communication with the service management component interface for the plurality of service management components through a second single touch point. The central trusted computing platform service manages interaction of the plurality of service management components with the plurality of cloud managed nodes, and the interaction of the plurality of cloud managed nodes with the repository.Type: GrantFiled: June 9, 2016Date of Patent: April 4, 2017Assignee: International Business Machines CorporationInventors: Venkata R. Jagana, Srinivasa Rao Mangipudi, Neil I. Readshaw, Karthik Sivakumar
-
Patent number: 9552480Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: GrantFiled: June 29, 2016Date of Patent: January 24, 2017Assignee: International Business Machines CorporationInventors: Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Patent number: 9542539Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: GrantFiled: June 20, 2016Date of Patent: January 10, 2017Assignee: International Business Machines CorporationInventors: Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Publication number: 20160306970Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: ApplicationFiled: June 29, 2016Publication date: October 20, 2016Inventors: Jerome R. Bell, JR., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Publication number: 20160294878Abstract: A distributed cloud environment system comprising: a repository; a plurality of cloud managed nodes with a client program interface; a plurality of service management components with a service management component interface; a central trusted computing platform service in communication with the repository, the plurality of cloud managed nodes and the plurality of service management components, comprising: a first interface for communication with the client program interface in each of the plurality of cloud managed nodes through a first single touch point; and a second interface for communication with the service management component interface for the plurality of service management components through a second single touch point. The central trusted computing platform service manages interaction of the plurality of service management components with the plurality of cloud managed nodes, and the interaction of the plurality of cloud managed nodes with the repository.Type: ApplicationFiled: June 9, 2016Publication date: October 6, 2016Inventors: Venkata R. Jagana, Srinivasa Rao Mangipudi, Neil I. Readshaw, Karthik Sivakumar
-
Publication number: 20160292401Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: ApplicationFiled: June 20, 2016Publication date: October 6, 2016Inventors: Jerome R. Bell, JR., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Patent number: 9411954Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: GrantFiled: January 6, 2016Date of Patent: August 9, 2016Assignee: International Business Machines CorporationInventors: Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Patent number: 9401954Abstract: A distributed cloud environment system comprising: a repository; a plurality of cloud managed nodes with a client program interface; a plurality of service management components with a service management component interface; a central trusted computing platform service in communication with the repository, the plurality of cloud managed nodes and the plurality of service management components, comprising: a first interface for communication with the client program interface in each of the plurality of cloud managed nodes through a first single touch point; and a second interface for communication with the service management component interface for the plurality of service management components through a second single touch point. The central trusted computing platform service manages interaction of the plurality of service management components with the plurality of cloud managed nodes, and the interaction of the plurality of cloud managed nodes with the repository.Type: GrantFiled: November 6, 2013Date of Patent: July 26, 2016Assignee: International Business Machines CorporationInventors: Venkata R. Jagana, Srinivasa R. Mangipudi, Neil I Readshaw, Karthik Sivakumar
-
Publication number: 20160132678Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: ApplicationFiled: January 6, 2016Publication date: May 12, 2016Inventors: Jerome R. Bell, JR., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Patent number: 9319430Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: GrantFiled: June 17, 2014Date of Patent: April 19, 2016Assignee: International Business Machines CorporationInventors: Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Publication number: 20150373064Abstract: A method and associated systems for enabling digital asset reuse. Users are each associated with a collection of digital assets and each user and each asset is assigned an eminence value. When a first user initially accesses an asset, the asset is copied to the first user's collection, thus indicating the first user's favorable view of the asset. When a second user accesses the first user's copy, the asset is copied to the second user's collection, and the eminence of the first user and of the asset are increased. If a third user accesses the second user's copy, the asset is copied to the third user's collection and eminence values of the first and second users and of the asset increase. The second user may locate an asset in the first user's collection through means that include the second user's decision to “follow” the first user.Type: ApplicationFiled: June 18, 2014Publication date: December 24, 2015Inventors: Anuradha Bhamidipaty, Saiprasad Kolluri Venkata Sesha, Gopal S. Pingali, Mark E. Podlaseck, Karthik Sivakumar
-
Publication number: 20150365437Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.Type: ApplicationFiled: June 17, 2014Publication date: December 17, 2015Inventors: Jerome R. Bell, JR., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
-
Publication number: 20150127795Abstract: A distributed cloud environment system comprising: a repository; a plurality of cloud managed nodes with a client program interface; a plurality of service management components with a service management component interface; a central trusted computing platform service in communication with the repository, the plurality of cloud managed nodes and the plurality of service management components, comprising: a first interface for communication with the client program interface in each of the plurality of cloud managed nodes through a first single touch point; and a second interface for communication with the service management component interface for the plurality of service management components through a second single touch point. The central trusted computing platform service manages interaction of the plurality of service management components with the plurality of cloud managed nodes, and the interaction of the plurality of cloud managed nodes with the repository.Type: ApplicationFiled: November 6, 2013Publication date: May 7, 2015Applicant: International Business Machines CorporationInventors: Venkata R. Jagana, Srinivasa R. Mangipudi, Neil I. Readshaw, Karthik Sivakumar
-
Patent number: 6554714Abstract: The invention provides a tube assembly containing an extruded torque tube (12) and two yokes (14) welded to either end of the tube. The tube is made from a base material metal and boron carbide particles in a ratio of approximately between 2:1 to 10:1 by weight. In another embodiment, a driveshaft assembly includes the above tube assembly with a front universal joint (24) and slip yoke (26) attached to a front end, and a rear universal joint (22) attached to a rear end. An axle yoke (28) is coupled at the rear universal joint (22).Type: GrantFiled: June 8, 2001Date of Patent: April 29, 2003Assignee: American Axle & Manufacturing, Inc.Inventors: Donald Joseph Kurecka, Karthik Sivakumar
-
Publication number: 20030050127Abstract: A driveshaft assembly has a tubular element with yokes coupled at the ends of the tubular element. The yoke includes a stub shaft portion for inserting into and welding the yoke to the tubular element. A receiving portion is present in the yoke to receive a universal joint. A balancing portion is present on the yoke to balance the rotational imbalance of the driveshaft. The balancing portion includes a desired mass of material so that in order to rotationally balance the driveshaft, mass may be removed from the balancing portion of the yoke.Type: ApplicationFiled: September 13, 2001Publication date: March 13, 2003Inventors: Mark S. Barrett, Karthik Sivakumar, Marc M. Menosky
-
Publication number: 20030013535Abstract: The invention provides a tube assembly containing an extruded torque tube (12) and two yokes (14) welded to either end of the tube. The tube is made from a base material metal and boron carbide particles in a ratio of approximately between 2:1 to 10:1 by weight. In another embodiment, a driveshaft assembly includes the above tube assembly with a front universal joint (24) and slip yoke (26) attached to a front end, and a rear universal joint (22) attached to a rear end. An axle yoke (28) is coupled at the rear universal joint (22).Type: ApplicationFiled: June 8, 2001Publication date: January 16, 2003Inventors: Donald Joseph Kurecka, Karthik Sivakumar