Patents by Inventor Malahal R. Naineni

Malahal R. Naineni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9588752
    Abstract: Methods may perform unattended software installation. The method may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The method may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The method may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files. The method may additionally include storing the received answers, and providing the stored answers when requested during execution of the one or more user-selected software installation files.
    Type: Grant
    Filed: October 31, 2013
    Date of Patent: March 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N Sharoff
  • Patent number: 9575739
    Abstract: Systems and computer program products may perform unattended software installation. The systems and computer program products may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The systems and computer program products may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The systems and computer program products may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files.
    Type: Grant
    Filed: March 6, 2013
    Date of Patent: February 21, 2017
    Assignee: International Business Machines Corporation
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N Sharoff
  • Patent number: 9529809
    Abstract: A request to write new data to a file is received. The file occupies a pre-determined size of storage space in a file-system. A determination is made whether an end location amount of space from an ending location value in an attribute up to the pre-determined size is insufficient to write the new data to the file. A second amount of space is computed. The first and the second amounts of space together are sufficient to write the new data. The second amount of space begins at a starting location value in a starting location attribute. The new data is written using the first and the second amounts of space. The ending location value is changed to indicate a location at the end of new data in the second amount of space. The starting location value is changed to indicate a location where existing data begins after new data.
    Type: Grant
    Filed: October 17, 2013
    Date of Patent: December 27, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Steven Michael French, Gunisha Madan, Malahal R. Naineni, Chandra Seetharaman
  • Patent number: 9519580
    Abstract: An approach is provided in which a storage system includes a first storage controller, a second storage controller, and multiple logical units. The storage system determines that a controller traffic load ratio between the first storage controller and the second storage controller has reached a threshold. In turn, the storage system selects one of the logical units and changes a preferred controller ownership of the selected logical unit from the first storage controller to the second storage controller to balance the controller traffic load ratio.
    Type: Grant
    Filed: November 11, 2013
    Date of Patent: December 13, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Michael S. Anderson, Malahal R. Naineni, Chandra Seetharaman
  • Patent number: 9317210
    Abstract: An approach is provided in which a storage system includes a first storage controller, a second storage controller, and multiple logical units. The storage system detects that a controller traffic load ratio between the first storage controller and the second storage controller has reached a threshold. As such, the storage system selects one of the logical units and partitions the selected logical unit into multiple logical units. The storage system, in turn, changes a preferred controller ownership of one of the logical unit partitions from the first storage controller to the second storage controller.
    Type: Grant
    Filed: December 13, 2013
    Date of Patent: April 19, 2016
    Assignee: International Business Machines Corporation
    Inventors: Michael S. Anderson, Malahal R. Naineni, Chandra Seetharaman
  • Patent number: 9111261
    Abstract: A method, system, and article for management of email communication content across a computer system network. An archive of email communications is retained on storage media in communication with the network. In addition, email communication is retained on storage media in communication with a client machine in the network. To mitigate duplication of email communications, duplicate communications are replaced with a hyperlink to the archive communication. This replacement supports removal of the duplicate communication from the storage media in communication with the client machine.
    Type: Grant
    Filed: April 23, 2010
    Date of Patent: August 18, 2015
    Assignee: International Business Machines Corporation
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha Nageshrao Sharoff
  • Publication number: 20150169233
    Abstract: An approach is provided in which a storage system includes a first storage controller, a second storage controller, and multiple logical units. The storage system detects that a controller traffic load ratio between the first storage controller and the second storage controller has reached a threshold. As such, the storage system selects one of the logical units and partitions the selected logical unit into multiple logical units. The storage system, in turn, changes a preferred controller ownership of one of the logical unit partitions from the first storage controller to the second storage controller.
    Type: Application
    Filed: December 13, 2013
    Publication date: June 18, 2015
    Applicant: International Business Machines Corporation
    Inventors: Michael S. Anderson, Malahal R. Naineni, Chandra Seetharaman
  • Publication number: 20150134920
    Abstract: An approach is provided in which a storage system includes a first storage controller, a second storage controller, and multiple logical units. The storage system determines that a controller traffic load ratio between the first storage controller and the second storage controller has reached a threshold. In turn, the storage system selects one of the logical units and changes a preferred controller ownership of the selected logical unit from the first storage controller to the second storage controller to balance the controller traffic load ratio.
    Type: Application
    Filed: November 11, 2013
    Publication date: May 14, 2015
    Applicant: International Business Machines Corporation
    Inventors: Michael S. Anderson, Malahal R. Naineni, Chandra Seetharaman
  • Publication number: 20150134929
    Abstract: An approach is provided in which a storage system includes a first storage controller, a second storage controller, and multiple logical units. The storage system determines that a controller traffic load ratio between the first storage controller and the second storage controller has reached a threshold. In turn, the storage system selects one of the logical units and changes a preferred controller ownership of the selected logical unit from the first storage controller to the second storage controller to balance the controller traffic load ratio.
    Type: Application
    Filed: December 5, 2013
    Publication date: May 14, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael S. Anderson, Malahal R. Naineni, Chandra Seetharaman
  • Publication number: 20150112935
    Abstract: A request to write new data to a file is received. The file occupies a pre-determined size of storage space in a file-system. A determination is made whether an end location amount of space from an ending location value in an attribute up to the pre-determined size is insufficient to write the new data to the file. A second amount of space is computed. The first and the second amounts of space together are sufficient to write the new data. The second amount of space begins at a starting location value in a starting location attribute. The new data is written using the first and the second amounts of space. The ending location value is changed to indicate a location at the end of new data in the second amount of space. The starting location value is changed to indicate a location where existing data begins after new data.
    Type: Application
    Filed: October 17, 2013
    Publication date: April 23, 2015
    Applicant: International Business Machines Corporation
    Inventors: STEVEN MICHAEL FRENCH, Gunisha Madan, Malahal R. Naineni, Chandra Seetharaman
  • Patent number: 8918862
    Abstract: Embodiments of the invention relate to password management of one or more data storage devices. A set of passwords are employed to manage access to the storage devices, with authentication of both passwords enabling access to the subject storage device(s) for read and/or write operation privileges. The first password is known by the user and is used as an initial input string. The second password is not known by the user and is authenticated with the subject storage device(s) through BIOS and without input from the user.
    Type: Grant
    Filed: August 31, 2011
    Date of Patent: December 23, 2014
    Assignee: International Business Machines Corporation
    Inventors: Sukadev Bhattiprolu, Jujjuri Venkateswararao, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha Nageshrao Sharoff
  • Publication number: 20140259008
    Abstract: Systems and computer program products may perform unattended software installation. The systems and computer program products may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The systems and computer program products may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The systems and computer program products may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files.
    Type: Application
    Filed: March 6, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff
  • Publication number: 20140259009
    Abstract: Methods may perform unattended software installation. The method may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The method may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The method may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files. The method may additionally include storing the received answers, and providing the stored answers when requested during execution of the one or more user-selected software installation files.
    Type: Application
    Filed: October 31, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N Sharoff
  • Publication number: 20140089557
    Abstract: A method for monitoring and managing virtual machine image storage in a virtualized computing environment is proposed, where the method for managing storage utilized by a virtual machine can include identifying one or more unused disk blocks in a guest virtual machine image, and removing the unused disk blocks from the guest virtual machine image.
    Type: Application
    Filed: December 3, 2013
    Publication date: March 27, 2014
    Applicant: International Business Machines Corporation
    Inventors: Sukadev Bhattiprolu, Mingming Cao, Venkateswararao Jujjuri, Haren Myneni, Malahal R Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha Sharoff
  • Patent number: 8509414
    Abstract: A target phone number previously associated with a first user is presently associated with a second user such that the target phone number is not presently associated with the first user. A caller uses a calling phone number to initiate a phone call to the target phone number. In response, it is determined whether the calling phone number is on a list of phone numbers associated with the first user. If the calling phone number is on the list of phone numbers associated with the first user, then the caller is notified that the target phone number is no longer associated with the first user. It is determined whether the caller wants to continue with the phone call, and if not, the phone call is terminated before it reaches the second user.
    Type: Grant
    Filed: September 1, 2008
    Date of Patent: August 13, 2013
    Assignee: International Business Machines Corporation
    Inventors: Sukadev Bhattiprolu, Haren Myneni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff, Malahal R. Naineni
  • Publication number: 20130151888
    Abstract: A technique for avoiding a ping-pong effect on active-passive paths in a storage system managing one or more logical storage units (LUNs) on behalf of one or more host systems. A first path to the LUNs is designated as an active path and a second path to the LUNs is designated as a passive path. The first path is also designated as a preferred path to the LUNs. In response to a path failure in which a host system cannot access the LUNs on the first path, a failover operation is implemented wherein the second path is designated as the active path and the first path is designated as the passive path. The designation of the first path as the preferred path to the LUNs is not changed. Subsequent failback operations are conditionally inhibited so that only the failover host that initiated the failover is permitted to initiate a failback.
    Type: Application
    Filed: December 12, 2011
    Publication date: June 13, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra S. Seetharaman, Narasimha N. Sharoff
  • Publication number: 20130055108
    Abstract: Embodiments of the invention relate to an on-line communication tool. A set of windows are employed to manage threads of communication. A first window maintains a list of threads available for discussion during the communication. A second window maintains a continuous log of the communication, and functions in a read-only mode. A third window maintains a read-write channel for a thread of the communication, and functions in a read-write mode. One or more threads may be selected from the first window, with each thread selection opening a separate third window. Text pertaining to a specific thread of the communication may be entered into the specific third window and populated to the continuous log of the second window.
    Type: Application
    Filed: August 31, 2011
    Publication date: February 28, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Jujjuri Venkateswarara, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha Nageshrao Sharoff
  • Publication number: 20130054868
    Abstract: Method, system and computer program product for monitoring and managing virtual machine image storage in a virtualized computing environment, where the method for managing storage utilized by a virtual machine can include identifying one or more unused disk blocks in a guest virtual machine image, and removing the unused disk blocks from the guest virtual machine image.
    Type: Application
    Filed: August 23, 2011
    Publication date: February 28, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Mingming Cao, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha Sharoff
  • Publication number: 20130055382
    Abstract: Embodiments of the invention relate to password management of one or more data storage devices. A set of passwords are employed to manage access to the storage devices, with authentication of both passwords enabling access to the subject storage device(s) for read and/or write operation privileges. The first password is known by the user and is used as an initial input string. The second password is not known by the user and is authenticated with the subject storage device(s) through BIOS and without input from the user.
    Type: Application
    Filed: August 31, 2011
    Publication date: February 28, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Jujjuri Venkateswararao, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha Nageshrao Sharoff
  • Publication number: 20120323481
    Abstract: In a method for selecting a parking lot exit, a computer receives geographic coordinates of a first parking exit of a parking facility. The computer receives geographic coordinates of a second parking exit of the parking facility. The computer determines a first route from the first parking exit to a destination, using the geographic coordinates of the first parking exit. The computer determines a second route from the second parking exit to the destination, using the geographic coordinates of the second parking exit. The computer selects one of the first parking exit and the second parking exit based on the first route and the second route.
    Type: Application
    Filed: June 20, 2011
    Publication date: December 20, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff