Patents by Inventor Krishnamohan DANTAM

Krishnamohan DANTAM has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160094639
    Abstract: A technique for assigning a user workload to an application server includes receiving a user request to initiate execution of a workload assigned to a user. An application server is selected, from among multiple application servers, to execute the workload based on compatibility between respective current states of the application servers and the workload.
    Type: Application
    Filed: August 26, 2015
    Publication date: March 31, 2016
    Inventors: ANAMITRA BHATTACHARYYA, KRISHNAMOHAN DANTAM, RAVI KOSARAJU, MANJUNATH D. MAKONAHALLI
  • Patent number: 9276943
    Abstract: Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change.
    Type: Grant
    Filed: October 25, 2013
    Date of Patent: March 1, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Krishnamohan Dantam, Ravi K. Kosaraju
  • Patent number: 9253253
    Abstract: A technique for assigning a user workload to an application server includes receiving a user request to initiate execution of a workload assigned to a user. An application server is selected, from among multiple application servers, to execute the workload based on compatibility between respective current states of the application servers and the workload.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: February 2, 2016
    Assignee: International Business Machines Corporation
    Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi Kosaraju, Manjunath D. Makonahalli
  • Publication number: 20150363729
    Abstract: Methods, systems, and computer program products for dynamically aggregating data from disparate sources. A computer implemented method involves initializing a scheduler application to create one or more intermediate tables. The intermediate tables are populated with automatically aggregated data from one or more disparate data sources. The data is governed by business rules in an enterprise system. The method further involves enabling access to a subset of the aggregated data in accordance with a user authorization credential.
    Type: Application
    Filed: August 24, 2015
    Publication date: December 17, 2015
    Inventors: James Battle, Krishnamohan Dantam
  • Publication number: 20150269278
    Abstract: Impact analysis for business applications can include receiving an event for a business application system, wherein the event specifies a change to an artifact of the business application system, and determining a node of a directed graph to which the event applies as a source node. The directed graph represents the business application system. The directed graph is formed by a plurality of nodes joined by links, wherein each node represents an artifact of the business application system and each link specifies semantic data indicating a dependency between the nodes joined by the link. Impact analysis further includes determining, using a processor, artifact assessment data for a first node connected to the source node through a first link, wherein the artifact assessment data includes a type of an effect of the event upon the first node and a context for the effect.
    Type: Application
    Filed: March 19, 2014
    Publication date: September 24, 2015
    Applicant: International Business Machines Corporation
    Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Sampathkumar Sriramadhesikan
  • Publication number: 20150269504
    Abstract: Impact analysis for business applications can include receiving an event for a business application system, wherein the event specifies a change to an artifact of the business application system, and determining a node of a directed graph to which the event applies as a source node. The directed graph represents the business application system. The directed graph is formed by a plurality of nodes joined by links, wherein each node represents an artifact of the business application system and each link specifies semantic data indicating a dependency between the nodes joined by the link. Impact analysis further includes determining, using a processor, artifact assessment data for a first node connected to the source node through a first link, wherein the artifact assessment data includes a type of an effect of the event upon the first node and a context for the effect.
    Type: Application
    Filed: September 24, 2014
    Publication date: September 24, 2015
    Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Sampathkumar Sriramadhesikan
  • Publication number: 20150121463
    Abstract: Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change.
    Type: Application
    Filed: October 25, 2013
    Publication date: April 30, 2015
    Applicant: International Business Machines Corporation
    Inventors: Eric M. Anderson, Krishnamohan Dantam, Ravi K. Kosaraju
  • Patent number: 8938722
    Abstract: A method and apparatus for locating errors is disclosed. A computer inserts an object reference into program code suspected of causing an error, the object reference having an initial class name. Responsive to execution of the program code, the computer generates a new class name for the object reference comprising the context information. The computer sets an object with the new class name as the object reference inserted into the program code suspected of causing the error, wherein the new class name of the object is located in computer memory in use by the executing program code. The computer then creates a record of the computer memory in use by the executing program code, the record including the context information in the form of the new class name of the object.
    Type: Grant
    Filed: October 17, 2012
    Date of Patent: January 20, 2015
    Assignee: International Business Machines Corporation
    Inventors: Krishnamohan Dantam, Ravi K. Kosaraju
  • Publication number: 20140109065
    Abstract: A method and apparatus for locating errors is disclosed. A computer inserts an object reference into program code suspected of causing an error, the object reference having an initial class name. Responsive to execution of the program code, the computer generates a new class name for the object reference comprising the context information. The computer sets an object with the new class name as the object reference inserted into the program code suspected of causing the error, wherein the new class name of the object is located in computer memory in use by the executing program code. The computer then creates a record of the computer memory in use by the executing program code, the record including the context information in the form of the new class name of the object.
    Type: Application
    Filed: October 17, 2012
    Publication date: April 17, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Krishnamohan Dantam, Ravi K. Kosaraju
  • Patent number: 8438220
    Abstract: A method, system and computer-usable medium are disclosed for reducing overhead associated with exporting remote objects. A session context is generated when a remote or local session is respectively established by a remote or local client with a bootstrap remote object. The session context is then determined to be either remote or local and marked accordingly. If the session context is marked as remote, then the bootstrap remote object is exported as remote objects. However, if the session context is marked as local, then the bootstrap remote object is not exported as remote objects. Instead, they are provided for use by the local client as non-exported remote objects.
    Type: Grant
    Filed: June 30, 2010
    Date of Patent: May 7, 2013
    Assignee: International Business Machines Corporation
    Inventors: Ravi Krishna Kosaraju, Krishnamohan Dantam, James Hulme Battle
  • Publication number: 20120197925
    Abstract: Memory usage of a database driver is reduced by accessing database elements from a database object within a database during a database operation, generating an element object for each different value of accessed database elements, where the database object includes at least two database elements having the same unique value such that a total number of accessed database elements is greater than a total number of generated element objects, storing the generated element objects in a storage structure, and providing the generated element objects from the storage structure within results for the database operation.
    Type: Application
    Filed: January 28, 2011
    Publication date: August 2, 2012
    Applicant: International Business Machines Corporation
    Inventors: Sachin Balagopalan, Krishnamohan Dantam, Ravi K. Kosaraju
  • Publication number: 20120005260
    Abstract: A method, system and computer-usable medium are disclosed for reducing overhead associated with exporting remote objects. A session context is generated when a remote or local session is respectively established by a remote or local client with a bootstrap remote object. The session context is then determined to be either remote or local and marked accordingly. If the session context is marked as remote, then the bootstrap remote object is exported as remote objects. However, if the session context is marked as local, then the bootstrap remote object is not exported as remote objects. Instead, they are provided for use by the local client as non-exported remote objects.
    Type: Application
    Filed: June 30, 2010
    Publication date: January 5, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ravi K. Kosaraju, Krishnamohan Dantam, James H. Battle
  • Publication number: 20110145913
    Abstract: Methods, systems, and computer program products for project management. A method embodiment for project management includes accepting a designation of disparate enterprise data from disparate sources in an enterprise system as plan data for a project. The disparate enterprise data is governed by business rules in the enterprise system. The method also includes dynamically aggregating the plan data from the disparate data sources; presenting the aggregated plan data in a project management interface; accepting a manipulation of a portion of the aggregated plan data; enforcing business rules on the aggregated plan data in the project management interface; and committing the manipulated aggregated plan data back to the datasources.
    Type: Application
    Filed: December 15, 2009
    Publication date: June 16, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James Battle, Krishnamohan Dantam
  • Publication number: 20090154701
    Abstract: The present invention solve the problems in the prior art by a embedding a number lock system on the router which serves as a input mechanism for entering the shared key or a shared seed which generates a shared key. A combination of numbers and letters may be used on the dials of the number lock. There is a slider to set the security protocol in use or turn it off. Once the user sets his key combination using the number lock on the device and sets a security mechanism he can go to his computer or a PDA or any device that supports Wi-Fi he will use the same mechanism that he does today with existing technology to enter the shared key and select the security mechanism.
    Type: Application
    Filed: December 17, 2007
    Publication date: June 18, 2009
    Inventors: Ravi K. KOSARAJU, Krishnamohan DANTAM