Patents by Inventor Narasimha N. Sharoff

Narasimha N. Sharoff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9588752
    Abstract: Methods may perform unattended software installation. The method may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The method may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The method may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files. The method may additionally include storing the received answers, and providing the stored answers when requested during execution of the one or more user-selected software installation files.
    Type: Grant
    Filed: October 31, 2013
    Date of Patent: March 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N Sharoff
  • Patent number: 9575739
    Abstract: Systems and computer program products may perform unattended software installation. The systems and computer program products may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The systems and computer program products may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The systems and computer program products may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files.
    Type: Grant
    Filed: March 6, 2013
    Date of Patent: February 21, 2017
    Assignee: International Business Machines Corporation
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N Sharoff
  • Publication number: 20140259009
    Abstract: Methods may perform unattended software installation. The method may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The method may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The method may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files. The method may additionally include storing the received answers, and providing the stored answers when requested during execution of the one or more user-selected software installation files.
    Type: Application
    Filed: October 31, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N Sharoff
  • Publication number: 20140259008
    Abstract: Systems and computer program products may perform unattended software installation. The systems and computer program products may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The systems and computer program products may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The systems and computer program products may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files.
    Type: Application
    Filed: March 6, 2013
    Publication date: September 11, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff
  • Patent number: 8509414
    Abstract: A target phone number previously associated with a first user is presently associated with a second user such that the target phone number is not presently associated with the first user. A caller uses a calling phone number to initiate a phone call to the target phone number. In response, it is determined whether the calling phone number is on a list of phone numbers associated with the first user. If the calling phone number is on the list of phone numbers associated with the first user, then the caller is notified that the target phone number is no longer associated with the first user. It is determined whether the caller wants to continue with the phone call, and if not, the phone call is terminated before it reaches the second user.
    Type: Grant
    Filed: September 1, 2008
    Date of Patent: August 13, 2013
    Assignee: International Business Machines Corporation
    Inventors: Sukadev Bhattiprolu, Haren Myneni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff, Malahal R. Naineni
  • Publication number: 20130151888
    Abstract: A technique for avoiding a ping-pong effect on active-passive paths in a storage system managing one or more logical storage units (LUNs) on behalf of one or more host systems. A first path to the LUNs is designated as an active path and a second path to the LUNs is designated as a passive path. The first path is also designated as a preferred path to the LUNs. In response to a path failure in which a host system cannot access the LUNs on the first path, a failover operation is implemented wherein the second path is designated as the active path and the first path is designated as the passive path. The designation of the first path as the preferred path to the LUNs is not changed. Subsequent failback operations are conditionally inhibited so that only the failover host that initiated the failover is permitted to initiate a failback.
    Type: Application
    Filed: December 12, 2011
    Publication date: June 13, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra S. Seetharaman, Narasimha N. Sharoff
  • Publication number: 20120323481
    Abstract: In a method for selecting a parking lot exit, a computer receives geographic coordinates of a first parking exit of a parking facility. The computer receives geographic coordinates of a second parking exit of the parking facility. The computer determines a first route from the first parking exit to a destination, using the geographic coordinates of the first parking exit. The computer determines a second route from the second parking exit to the destination, using the geographic coordinates of the second parking exit. The computer selects one of the first parking exit and the second parking exit based on the first route and the second route.
    Type: Application
    Filed: June 20, 2011
    Publication date: December 20, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff
  • Patent number: 8336052
    Abstract: A first computer program runs in user memory space of a computing environment, and a second computer program runs in kernel memory space of the computing environment. The first computer program determines processes that constitute a workload. The second computer program creates a workload identifier corresponding to the workload, and associates the processes with the workload identifier. The first computer program requests metrics regarding the workload. In response, the second computer program collects such metrics by collecting metrics regarding the processes that constitute the workload and that are associated with the workload identifier The second computer program reports the metrics regarding the workload to the first computer program.
    Type: Grant
    Filed: June 16, 2008
    Date of Patent: December 18, 2012
    Assignee: International Business Machines Corporation
    Inventors: Narasimha N. Sharoff, Vivek Kashyap, Chandrasekhara Seetharaman
  • Publication number: 20120260246
    Abstract: Systems, methods and computer program products may provide software installation on a computer in a computer system. A software installation method may include installing at a server in a computer system a first files package including computer program files for a first software application, the computer system including at least a first computer installed with a first configuration package, the first configuration package including files necessary to configure and register the first software application, receiving a request at the server from the first computer for access to the first files package, and making the first files package available for use by the first computer.
    Type: Application
    Filed: April 6, 2011
    Publication date: October 11, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Venkateswarara Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N Sharoff
  • Patent number: 8201182
    Abstract: A method of managing software application workloads starts, on a machine, a software application from startup script. The startup script includes startup tasks. The machine includes an operating system. The operating system includes a kernel. The method requests an application group identifier from the kernel. The method associates the startup tasks with the application group identifier until the startup script ends. The method requests application group identifiers from the kernel. If said application group identifier is a workload, the method requests the kernel to aggregate usage data for the application group identifier. If the application group identifier is not a workload, the method determines a set of application group identifiers that comprise a work load, and requests the kernel to aggregate usage data for the set of application group identifiers. The method receives the aggregated usage data from the kernel, and uses the aggregated usage data to manage the workload.
    Type: Grant
    Filed: December 24, 2007
    Date of Patent: June 12, 2012
    Assignee: International Business Machines Corporation
    Inventors: Vivek Kashyap, Chandra S. Seetharaman, Narasimha N. Sharoff
  • Publication number: 20120016890
    Abstract: Systems, methods and computer program products are disclosed herein for assigning visual characteristics to records of a data structure and displaying those records. In response to an attribute being selected, records of the data structure may be sorted by values of the selected attribute of the records. A first set of records having values of the selected attribute that correspond to a first value may be identified. A second set of records having values of the selected attribute that correspond to a second value also may be identified. A first visual characteristic may automatically be assigned to each record of the first set of records and a second visual characteristic, that is different from the first visual characteristic, may be automatically assigned to each record of the second set of records.
    Type: Application
    Filed: July 15, 2010
    Publication date: January 19, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff
  • Publication number: 20110264991
    Abstract: A method, system, and article for management of email communication content across a computer system network. An archive of email communications is retained on storage media in communication with the network. In addition, email communication is retained on storage media in communication with a client machine in the network. To mitigate duplication of email communications, duplicate communications are replaced with a hyperlink to the archive communication. This replacement supports removal of the duplicate communication from the storage media in communication with the client machine.
    Type: Application
    Filed: April 23, 2010
    Publication date: October 27, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff
  • Patent number: 8001482
    Abstract: A method of displaying tab titles in a computer user interface receives a request to display a new tab in a tab area having a length. The new tab has a width and the new tab has a title having a length. The method determines a number of tabs to be displayed in the area and determines if the number of tabs to be displayed multiplied by the tab width is greater than the length of the tab area. If so, the method sets the tab width equal to the length of the tab area divided by the number of tabs. The method determines if the length of the title is greater than the tab width. If so, the method determines if the title has any words in common with any other titles of tabs. If so, the method deletes the common words from the titles, and displays the titles with the deleted common words in the tabs. The method may set a maximum number of tabs to be displayed in the tab area. The maximum number of tabs may be determined by the length of the tab area and a minimum tab width.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: August 16, 2011
    Assignee: International Business Machines Corporation
    Inventors: Sukadev Bhattiprolu, Haren Myneni, Malahal R. Naineni, Chandra S. Seetharaman, Narasimha N. Sharoff
  • Publication number: 20100274698
    Abstract: A method, system, and article are provided for effectively managing a financial account for fraud prevention. The account is provided with a soft credit limit parameter and a tool for management of the soft credit limit parameter. The soft credit limit is in addition to a hard credit limit. More specifically, the hard credit limit is static and fixed by a credit issuing authority. In contrast, the soft credit limit is amendable under different circumstances and in conjunction with the tool is managed by the holder of the account.
    Type: Application
    Filed: April 27, 2009
    Publication date: October 28, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sukadev Bhattiprolu, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff
  • Publication number: 20100054443
    Abstract: A target phone number previously associated with a first user is presently associated with a second user such that the target phone number is not presently associated with the first user. A caller uses a calling phone number to initiate a phone call to the target phone number. In response, it is determined whether the calling phone number is on a list of phone numbers associated with the first user. If the calling phone number is on the list of phone numbers associated with the first user, then the caller is notified that the target phone number is no longer associated with the first user. It is determined whether the caller wants to continue with the phone call, and if not, the phone call is terminated before it reaches the second user.
    Type: Application
    Filed: September 1, 2008
    Publication date: March 4, 2010
    Inventors: Sukadev Bhattiprolu, Haren Myneni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff, Malahal R. Naineni
  • Publication number: 20100036767
    Abstract: In response to a payor planning a specific payment for a given amount to a payee, the given amount is reserved from a balance of a financial account of the payor from which the specific payment is to be made. As such, the given amount reserved from the balance is only available for settling the specific payment and is otherwise unavailable. After the payor has planned the specific payment for the given amount to the payee, in response to the specific payment for the given amount actually being made to the payee, the given amount reserved from the balance of the financial account is used to settle the specific payment for the given amount being made to the payee.
    Type: Application
    Filed: August 6, 2008
    Publication date: February 11, 2010
    Inventors: Narasimha N. Sharoff, Haren Myneni, Malahal R. Naineni, Sukadev Bhattiprolu, Chandra Seetharaman
  • Publication number: 20090313625
    Abstract: A first computer program runs in user memory space of a computing environment, and a second computer program runs in kernel memory space of the computing environment. The first computer program determines processes that constitute a workload. The second computer program creates a workload identifier corresponding to the workload, and associates the processes with the workload identifier. The first computer program requests metrics regarding the workload. In response, the second computer program collects such metrics by collecting metrics regarding the processes that constitute the workload and that are associated with the workload identifier The second computer program reports the metrics regarding the workload to the first computer program.
    Type: Application
    Filed: June 16, 2008
    Publication date: December 17, 2009
    Inventors: Narasimha N. Sharoff, Vivek Kashyap, Chandra Seetharaman
  • Publication number: 20090164633
    Abstract: A method of managing software application workloads starts, on a machine, a software application from startup script. The startup script includes startup tasks. The machine includes an operating system. The operating system includes a kernel. The method requests an application group identifier from the kernel. The method associates the startup tasks with the application group identifier until the startup script ends. The method requests application group identifiers from the kernel. If said application group identifier is a workload, the method requests the kernel to aggregate usage data for the application group identifier. If the application group identifier is not a workload, the method determines a set of application group identifiers that comprise a work load, and requests the kernel to aggregate usage data for the set of application group identifiers. The method receives the aggregated usage data from the kernel, and uses the aggregated usage data to manage the workload.
    Type: Application
    Filed: December 24, 2007
    Publication date: June 25, 2009
    Inventors: Vivek Kashyap, Chandra S. Seetharaman, Narasimha N. Sharoff
  • Publication number: 20090164934
    Abstract: A method of displaying tab titles in a computer user interface receives a request to display a new tab in a tab area having a length. The new tab has a width and the new tab has a title having a length. The method determines a number of tabs to be displayed in the area and determines if the number of tabs to be displayed multiplied by the tab width is greater than the length of the tab area. If so, the method sets the tab width equal to the length of the tab area divided by the number of tabs. The method determines if the length of the title is greater than the tab width. If so, the method determines if the title has any words in common with any other titles of tabs. If so, the method deletes the common words from the titles, and displays the titles with the deleted common words in the tabs. The method may set a maximum number of tabs to be displayed in the tab area. The maximum number of tabs may be determined by the length of the tab area and a minimum tab width.
    Type: Application
    Filed: December 21, 2007
    Publication date: June 25, 2009
    Inventors: Sukadev Bhattiprolu, Haren Myneni, Malahal R. Naineni, Chandra S. Seetharaman, Narasimha N. Sharoff
  • Patent number: 7546352
    Abstract: A method for automatically merging e-mail replies containing reviewer comments to open source software code is disclosed. Individual reply messages may be identified for merger and evaluated for comments for each line of code. Comments, context information, and reviewer information may then be extracted and incorporated into a merged reply message where each line of code commented on contains comments associated with that line of code. The merged reply message may then be transmitted back to the sender with the incorporated comments.
    Type: Grant
    Filed: August 15, 2008
    Date of Patent: June 9, 2009
    Assignee: International Business Machines Corporation
    Inventors: Sukadev Bhattiprolu, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra S. Seetharaman, Narasimha N. Sharoff