Patents by Inventor Nitin S. Jadhav
Nitin S. Jadhav has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11782797Abstract: A method, system and computer program product for achieving activity centric computing. An activity (e.g., opening an application, opening an electronic communication, initiating a printing action, initiating a browsing session) performed by a user on a computing device is detected. In response to detecting the activity, the runtime environment is captured and the session workflow associated with the detected activity is recorded. The session workflow refers to the events performed by the user on the computing device in connection with performing an activity (e.g., application usage, web browsing) on the computing device. The captured runtime environment and the recorded session workflow associated with the detected activity are stored in a portable container. After receiving an indication to share the activity, an image of the container is created and stored in a repository to be shared among users to replay the session workflow associated with the activity.Type: GrantFiled: June 11, 2021Date of Patent: October 10, 2023Assignee: International Business Machines CorporationInventors: Nitin S. Jadhav, Shailendra Moyal, Akash U. Dhoot
-
Patent number: 11277275Abstract: A computer implemented method for ranking devices according to compatibility with a collaboration service includes receiving a set of collaboration information and a set of device information, wherein the collaboration information includes a service through which the collaboration is available and the set of device information corresponds to one or more registered devices, determining contextual information corresponding to the collaboration, wherein the contextual information includes minimum device requirements for participation in the collaboration, calculating compatibility metrics for one or more participant devices according to the received set of device information and the determined contextual information corresponding to the collaboration, ranking the one or more registered devices according to the calculated compatibility metrics, and enabling a device to access the collaboration according to the device rankings.Type: GrantFiled: May 13, 2019Date of Patent: March 15, 2022Assignee: International Business Machines CorporationInventors: Shailendra Moyal, Akash U. Dhoot, Nitin S. Jadhav
-
Patent number: 11277274Abstract: A computer implemented method for ranking devices according to compatibility with a collaboration service includes receiving a set of collaboration information and a set of device information, wherein the collaboration information includes a service through which the collaboration is available and the set of device information corresponds to one or more registered devices, determining contextual information corresponding to the collaboration, wherein the contextual information includes minimum device requirements for participation in the collaboration, calculating compatibility metrics for one or more participant devices according to the received set of device information and the determined contextual information corresponding to the collaboration, ranking the one or more registered devices according to the calculated compatibility metrics, and enabling a device to access the collaboration according to the device rankings.Type: GrantFiled: October 12, 2017Date of Patent: March 15, 2022Assignee: International Business Machines CorporationInventors: Shailendra Moyal, Akash U. Dhoot, Nitin S. Jadhav
-
Patent number: 11140050Abstract: Ad hoc private localization of service instances of a global service provided via hybrid cloud computing environment. In-memory and/or container image-based provisioning of a service instance from a public cloud portion to a private cloud portion within a hybrid cloud computing environment is based on context of service usage, pattern of service usage, predicted environmental conditions, and/or subscription-based input.Type: GrantFiled: September 26, 2018Date of Patent: October 5, 2021Assignee: International Business Machines CorporationInventors: Shailendra Moyal, Akash U. Dhoot, Nitin S. Jadhav, Niteen D. Lakhe
-
Publication number: 20210303414Abstract: A method, system and computer program product for achieving activity centric computing. An activity (e.g., opening an application, opening an electronic communication, initiating a printing action, initiating a browsing session) performed by a user on a computing device is detected. In response to detecting the activity, the runtime environment is captured and the session workflow associated with the detected activity is recorded. The session workflow refers to the events performed by the user on the computing device in connection with performing an activity (e.g., application usage, web browsing) on the computing device. The captured runtime environment and the recorded session workflow associated with the detected activity are stored in a portable container. After receiving an indication to share the activity, an image of the container is created and stored in a repository to be shared among users to replay the session workflow associated with the activity.Type: ApplicationFiled: June 11, 2021Publication date: September 30, 2021Inventors: Nitin S. Jadhav, Shailendra Moyal, Akash U. Dhoot
-
Patent number: 11119864Abstract: A method, system and computer program product for achieving activity centric computing. An activity (e.g., opening an application, opening an electronic communication, initiating a printing action, initiating a browsing session) performed by a user on a computing device is detected. In response to detecting the activity, the runtime environment is captured and the session workflow associated with the detected activity is recorded. The session workflow refers to the events performed by the user on the computing device in connection with performing an activity (e.g., application usage, web browsing) on the computing device. The captured runtime environment and the recorded session workflow associated with the detected activity are stored in a portable container. After receiving an indication to share the activity, an image of the container is created and stored in a repository to be shared among users to replay the session workflow associated with the activity.Type: GrantFiled: October 2, 2018Date of Patent: September 14, 2021Assignee: International Business Machines CorporationInventors: Nitin S. Jadhav, Shailendra Moyal, Akash U. Dhoot
-
Patent number: 10713349Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: GrantFiled: May 29, 2018Date of Patent: July 14, 2020Assignee: International Business Machines CorporationInventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Publication number: 20200104217Abstract: A method, system and computer program product for achieving activity centric computing. An activity (e.g., opening an application, opening an electronic communication, initiating a printing action, initiating a browsing session) performed by a user on a computing device is detected. In response to detecting the activity, the runtime environment is captured and the session workflow associated with the detected activity is recorded. The session workflow refers to the events performed by the user on the computing device in connection with performing an activity (e.g., application usage, web browsing) on the computing device. The captured runtime environment and the recorded session workflow associated with the detected activity are stored in a portable container. After receiving an indication to share the activity, an image of the container is created and stored in a repository to be shared among users to replay the session workflow associated with the activity.Type: ApplicationFiled: October 2, 2018Publication date: April 2, 2020Inventors: Nitin S. Jadhav, Shailendra Moyal, Akash U. Dhoot
-
Publication number: 20200099595Abstract: Ad hoc private localization of service instances of a global service provided via hybrid cloud computing environment. In-memory and/or container image-based provisioning of a service instance from a public cloud portion to a private cloud portion within a hybrid cloud computing environment is based on context of service usage, pattern of service usage, predicted environmental conditions, and/or subscription-based input.Type: ApplicationFiled: September 26, 2018Publication date: March 26, 2020Inventors: Shailendra Moyal, Akash U. Dhoot, Nitin S. Jadhav, Niteen D. Lakhe
-
Patent number: 10403287Abstract: A method for identifying and managing users within a group during a teleconference. The method includes a computer processor determining that a group of users are sharing a first client device to communicate, via a teleconference with one or more other users. The method further includes identifying a first user, of the group of user that are sharing the first client device, that is speaking during a first portion of the teleconference. The method further includes determining an action corresponding to the first user, where an action affects managing content of the teleconference at a client device. The method further includes initiating the determined action corresponding to the first user.Type: GrantFiled: January 19, 2017Date of Patent: September 3, 2019Assignee: International Business Machines CorporationInventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Publication number: 20190268172Abstract: A computer implemented method for ranking devices according to compatibility with a collaboration service includes receiving a set of collaboration information and a set of device information, wherein the collaboration information includes a service through which the collaboration is available and the set of device information corresponds to one or more registered devices, determining contextual information corresponding to the collaboration, wherein the contextual information includes minimum device requirements for participation in the collaboration, calculating compatibility metrics for one or more participant devices according to the received set of device information and the determined contextual information corresponding to the collaboration, ranking the one or more registered devices according to the calculated compatibility metrics, and enabling a device to access the collaboration according to the device rankings.Type: ApplicationFiled: May 13, 2019Publication date: August 29, 2019Inventors: Shailendra Moyal, Akash U. Dhoot, Nitin S. Jadhav
-
Publication number: 20190116055Abstract: A computer implemented method for ranking devices according to compatibility with a collaboration service includes receiving a set of collaboration information and a set of device information, wherein the collaboration information includes a service through which the collaboration is available and the set of device information corresponds to one or more registered devices, determining contextual information corresponding to the collaboration, wherein the contextual information includes minimum device requirements for participation in the collaboration, calculating compatibility metrics for one or more participant devices according to the received set of device information and the determined contextual information corresponding to the collaboration, ranking the one or more registered devices according to the calculated compatibility metrics, and enabling a device to access the collaboration according to the device rankings.Type: ApplicationFiled: October 12, 2017Publication date: April 18, 2019Inventors: Shailendra Moyal, Akash U. Dhoot, Nitin S. Jadhav
-
Patent number: 10204218Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: GrantFiled: May 8, 2018Date of Patent: February 12, 2019Assignee: International Business Machines CorporationInventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Patent number: 10198571Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: GrantFiled: May 8, 2018Date of Patent: February 5, 2019Assignee: International Business Machines CorporationInventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Publication number: 20180276368Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: ApplicationFiled: May 29, 2018Publication date: September 27, 2018Inventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Publication number: 20180247052Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: ApplicationFiled: May 8, 2018Publication date: August 30, 2018Inventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Publication number: 20180247051Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: ApplicationFiled: May 8, 2018Publication date: August 30, 2018Inventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Publication number: 20180204576Abstract: A method for identifying and managing users within a group during a teleconference. The method includes a computer processor determining that a group of users are sharing a first client device to communicate, via a teleconference with one or more other users. The method further includes identifying a first user, of the group of user that are sharing the first client device, that is speaking during a first portion of the teleconference. The method further includes determining an action corresponding to the first user, where an action affects managing content of the teleconference at a client device. The method further includes initiating the determined action corresponding to the first user.Type: ApplicationFiled: January 19, 2017Publication date: July 19, 2018Inventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Patent number: 10007780Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: GrantFiled: December 12, 2016Date of Patent: June 26, 2018Assignee: International Business Machines CorporationInventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Publication number: 20180165444Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: ApplicationFiled: December 12, 2016Publication date: June 14, 2018Inventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal