Patents by Inventor Krishnamohan DANTAM
Krishnamohan DANTAM has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160094639Abstract: A technique for assigning a user workload to an application server includes receiving a user request to initiate execution of a workload assigned to a user. An application server is selected, from among multiple application servers, to execute the workload based on compatibility between respective current states of the application servers and the workload.Type: ApplicationFiled: August 26, 2015Publication date: March 31, 2016Inventors: ANAMITRA BHATTACHARYYA, KRISHNAMOHAN DANTAM, RAVI KOSARAJU, MANJUNATH D. MAKONAHALLI
-
Patent number: 9276943Abstract: Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change.Type: GrantFiled: October 25, 2013Date of Patent: March 1, 2016Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Krishnamohan Dantam, Ravi K. Kosaraju
-
Patent number: 9253253Abstract: A technique for assigning a user workload to an application server includes receiving a user request to initiate execution of a workload assigned to a user. An application server is selected, from among multiple application servers, to execute the workload based on compatibility between respective current states of the application servers and the workload.Type: GrantFiled: September 26, 2014Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi Kosaraju, Manjunath D. Makonahalli
-
Publication number: 20150363729Abstract: Methods, systems, and computer program products for dynamically aggregating data from disparate sources. A computer implemented method involves initializing a scheduler application to create one or more intermediate tables. The intermediate tables are populated with automatically aggregated data from one or more disparate data sources. The data is governed by business rules in an enterprise system. The method further involves enabling access to a subset of the aggregated data in accordance with a user authorization credential.Type: ApplicationFiled: August 24, 2015Publication date: December 17, 2015Inventors: James Battle, Krishnamohan Dantam
-
Publication number: 20150269278Abstract: Impact analysis for business applications can include receiving an event for a business application system, wherein the event specifies a change to an artifact of the business application system, and determining a node of a directed graph to which the event applies as a source node. The directed graph represents the business application system. The directed graph is formed by a plurality of nodes joined by links, wherein each node represents an artifact of the business application system and each link specifies semantic data indicating a dependency between the nodes joined by the link. Impact analysis further includes determining, using a processor, artifact assessment data for a first node connected to the source node through a first link, wherein the artifact assessment data includes a type of an effect of the event upon the first node and a context for the effect.Type: ApplicationFiled: March 19, 2014Publication date: September 24, 2015Applicant: International Business Machines CorporationInventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Sampathkumar Sriramadhesikan
-
Publication number: 20150269504Abstract: Impact analysis for business applications can include receiving an event for a business application system, wherein the event specifies a change to an artifact of the business application system, and determining a node of a directed graph to which the event applies as a source node. The directed graph represents the business application system. The directed graph is formed by a plurality of nodes joined by links, wherein each node represents an artifact of the business application system and each link specifies semantic data indicating a dependency between the nodes joined by the link. Impact analysis further includes determining, using a processor, artifact assessment data for a first node connected to the source node through a first link, wherein the artifact assessment data includes a type of an effect of the event upon the first node and a context for the effect.Type: ApplicationFiled: September 24, 2014Publication date: September 24, 2015Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Sampathkumar Sriramadhesikan
-
Publication number: 20150121463Abstract: Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change.Type: ApplicationFiled: October 25, 2013Publication date: April 30, 2015Applicant: International Business Machines CorporationInventors: Eric M. Anderson, Krishnamohan Dantam, Ravi K. Kosaraju
-
Patent number: 8938722Abstract: A method and apparatus for locating errors is disclosed. A computer inserts an object reference into program code suspected of causing an error, the object reference having an initial class name. Responsive to execution of the program code, the computer generates a new class name for the object reference comprising the context information. The computer sets an object with the new class name as the object reference inserted into the program code suspected of causing the error, wherein the new class name of the object is located in computer memory in use by the executing program code. The computer then creates a record of the computer memory in use by the executing program code, the record including the context information in the form of the new class name of the object.Type: GrantFiled: October 17, 2012Date of Patent: January 20, 2015Assignee: International Business Machines CorporationInventors: Krishnamohan Dantam, Ravi K. Kosaraju
-
Publication number: 20140109065Abstract: A method and apparatus for locating errors is disclosed. A computer inserts an object reference into program code suspected of causing an error, the object reference having an initial class name. Responsive to execution of the program code, the computer generates a new class name for the object reference comprising the context information. The computer sets an object with the new class name as the object reference inserted into the program code suspected of causing the error, wherein the new class name of the object is located in computer memory in use by the executing program code. The computer then creates a record of the computer memory in use by the executing program code, the record including the context information in the form of the new class name of the object.Type: ApplicationFiled: October 17, 2012Publication date: April 17, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Krishnamohan Dantam, Ravi K. Kosaraju
-
Patent number: 8438220Abstract: A method, system and computer-usable medium are disclosed for reducing overhead associated with exporting remote objects. A session context is generated when a remote or local session is respectively established by a remote or local client with a bootstrap remote object. The session context is then determined to be either remote or local and marked accordingly. If the session context is marked as remote, then the bootstrap remote object is exported as remote objects. However, if the session context is marked as local, then the bootstrap remote object is not exported as remote objects. Instead, they are provided for use by the local client as non-exported remote objects.Type: GrantFiled: June 30, 2010Date of Patent: May 7, 2013Assignee: International Business Machines CorporationInventors: Ravi Krishna Kosaraju, Krishnamohan Dantam, James Hulme Battle
-
Publication number: 20120197925Abstract: Memory usage of a database driver is reduced by accessing database elements from a database object within a database during a database operation, generating an element object for each different value of accessed database elements, where the database object includes at least two database elements having the same unique value such that a total number of accessed database elements is greater than a total number of generated element objects, storing the generated element objects in a storage structure, and providing the generated element objects from the storage structure within results for the database operation.Type: ApplicationFiled: January 28, 2011Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: Sachin Balagopalan, Krishnamohan Dantam, Ravi K. Kosaraju
-
Publication number: 20120005260Abstract: A method, system and computer-usable medium are disclosed for reducing overhead associated with exporting remote objects. A session context is generated when a remote or local session is respectively established by a remote or local client with a bootstrap remote object. The session context is then determined to be either remote or local and marked accordingly. If the session context is marked as remote, then the bootstrap remote object is exported as remote objects. However, if the session context is marked as local, then the bootstrap remote object is not exported as remote objects. Instead, they are provided for use by the local client as non-exported remote objects.Type: ApplicationFiled: June 30, 2010Publication date: January 5, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ravi K. Kosaraju, Krishnamohan Dantam, James H. Battle
-
Publication number: 20110145913Abstract: Methods, systems, and computer program products for project management. A method embodiment for project management includes accepting a designation of disparate enterprise data from disparate sources in an enterprise system as plan data for a project. The disparate enterprise data is governed by business rules in the enterprise system. The method also includes dynamically aggregating the plan data from the disparate data sources; presenting the aggregated plan data in a project management interface; accepting a manipulation of a portion of the aggregated plan data; enforcing business rules on the aggregated plan data in the project management interface; and committing the manipulated aggregated plan data back to the datasources.Type: ApplicationFiled: December 15, 2009Publication date: June 16, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James Battle, Krishnamohan Dantam
-
Publication number: 20090154701Abstract: The present invention solve the problems in the prior art by a embedding a number lock system on the router which serves as a input mechanism for entering the shared key or a shared seed which generates a shared key. A combination of numbers and letters may be used on the dials of the number lock. There is a slider to set the security protocol in use or turn it off. Once the user sets his key combination using the number lock on the device and sets a security mechanism he can go to his computer or a PDA or any device that supports Wi-Fi he will use the same mechanism that he does today with existing technology to enter the shared key and select the security mechanism.Type: ApplicationFiled: December 17, 2007Publication date: June 18, 2009Inventors: Ravi K. KOSARAJU, Krishnamohan DANTAM