Patents by Inventor Raman Harishankar

Raman Harishankar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110196719
    Abstract: A system gathers real-time data about an enterprise over a network. A user device displays a dashboard showing a component business model map, a heat map, key performance indicators for components, key performance indicators for the enterprise, and gradients. The business is enhanced by making investments and changes to those operations having large gradients.
    Type: Application
    Filed: February 5, 2010
    Publication date: August 11, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Muthulakshmi Bhandari, Allison B. Botros, Edward H B Giesen, Raman Harishankar, Jayashree Jaishankar, Ahamed Jalaldeen, Ying Tat Leung, Ashish Mungi, Siddharth N. Purohit, Philip G. Rains, Jorge L. C. Sanz
  • Publication number: 20110137819
    Abstract: A system creates and maintains an industry business architecture model (IBAM) over a network. The IBAM has a component business model, process model, service model, and information model. It also may include a reference architecture, demos and other knowledge assets, and collateral.
    Type: Application
    Filed: December 4, 2009
    Publication date: June 9, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Muthulakshmi Bhandari, Allison Baines Botros, Edward H B Giesen, Raman Harishankar, Jayashree Jaishankar, Ahamed Jalaldeen, Ying Tat Leung, Ashish Mungi, Siddharth N. Purohit, Philip G. Rains, Jorge L. C. Sanz
  • Publication number: 20110137714
    Abstract: A system and dashboard are provided for managing business performance. Key performance indicators developed for a component business model map are computed and displayed along with the map in real time. A user may select a corresponding key performance indicator to display a heat map of components on the dashboard.
    Type: Application
    Filed: December 3, 2009
    Publication date: June 9, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Muthulakshmi Bhandari, Allison Baines Botros, Edward H B Giesen, Raman Harishankar, Ying Tat Leung, Ashish Mungi, Siddharth N. Purohit, Jorge L. C. Sanz
  • Publication number: 20110137622
    Abstract: A system creates and maintains an industry business architecture model over a network. The system defines specific levels of maturity for the model. Associations, relationships, and linkages between content elements are also determined. From these, a specific level of aggregate maturity is defined according to an algorithm.
    Type: Application
    Filed: December 7, 2009
    Publication date: June 9, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Muthulakshmi Bhandari, Raman Harishankar, Jayashree Jaishankar, Ashish Mungi, Siddharth N. Purohit, Jorge L. C. Sanz
  • Patent number: 7934093
    Abstract: Security levels are assigned to a shared component. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager encounters a shared component, the workflow manager uses the security tracking table entries in order to determine a security level to assign the shared component. The workflow manager assigns the determined security level to the shared component, and invokes the shared component to execute the corresponding process step.
    Type: Grant
    Filed: May 7, 2008
    Date of Patent: April 26, 2011
    Assignee: International Business Machines Corporation
    Inventors: Peter Alan Coldicott, George M. Galambos, Raman Harishankar, Kerrie Lamont Holley, Edward Emile Kelley
  • Publication number: 20100250300
    Abstract: A business consulting company performs an assessment of a client business enterprise. The assessment includes use of a computer implemented tool for performing business component modeling techniques for creating a heat map. The heat map is used with the tool to form a domain decomposition, form a goal-service modeling structure, and perform an existing asset analysis based to linkages to the heat map. The assessment is delivered to the client company. A service oriented architecture, SOA, solution plan based on the assessment may also be delivered. The consulting company may implement the SOA plan for the client.
    Type: Application
    Filed: March 26, 2009
    Publication date: September 30, 2010
    Applicant: International Business Machines Corporation
    Inventors: Samuel M. Antoun, Ali P. Arsanjani, Graham Paul Bate, Kishore Channabasavaiah, Shuvanker Ghosh, Edward H B Giesen, Thomas Franklin Guinan, Raman Harishankar, Kerrie Lamont Holley, Jorge L. C. Sanz
  • Publication number: 20100251205
    Abstract: A business enterprise is assessed by a consultant using a computer implemented tool for practicing component business modeling techniques. The tool builds a map of components, filters the map to form a heat map and identifies collaborations. Key performance indicators are evaluated.
    Type: Application
    Filed: March 26, 2009
    Publication date: September 30, 2010
    Applicant: International Business Machines Corporation
    Inventors: Samuel Antoun, Graham Paul Bate, Kishore Channabasavaiah, Shuvanker Ghosh, Edward H B Giesen, Thomas Franklin Guinan, Raman Harishankar, Kerrie Lamont Holley, Joseph David Kramer, Ying Tat Leung, Kelly Anne Lyman, Jorge L. C. Sanz, Ignacio Gabriel Terrizzano
  • Publication number: 20100250328
    Abstract: An assessment of a business is performed using a computer implemented tool to provide a strategy model, an operating model, and an IT model. The assessment is performed by a services providing company for a client company. The assessment is used to create a SOA solution for the business. The services providing company may also implement the SOA solution for the business.
    Type: Application
    Filed: March 26, 2009
    Publication date: September 30, 2010
    Applicant: International Business Machines Corporation
    Inventors: Ali P. Arsanjani, Graham Paul Bate, Edward H. B. Giesen, Thomas Franklin Guinan, Raman Harishankar, Kerrie Lamont Holley, Jorge L. C. Sanz, Sham Madhukar Vaidya
  • Publication number: 20100031226
    Abstract: A method, system, and computer-readable medium for utilizing the design centers, assembly line and job shops of a global delivery network across multiple software factories are presented. A work packet is examined to determine if it is authorized to be sub-contracted out to a different design center, assembly line or job shop than the design center/assembly line/job shop that have primary responsibility for the work packet. If the work packet is authorized to be sub-contracted out, then the work packet is reassigned to a different pre-qualified design center/assembly line/job shop.
    Type: Application
    Filed: July 31, 2008
    Publication date: February 4, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: JARIR K. CHAAR, AL A. HAMID, RAMAN HARISHANKAR, JOSEPH P. HUCHEL, THOMAS A. JOBSON, JR., DANIEL V. OPPENHEIM, KRISHNA C. RATAKONDA
  • Patent number: 7536603
    Abstract: Maintaining functionality during component failures is presented. During application registration, a recovery engine generates a recovery plan for the application. The recovery plan includes recovery actions that correspond to each component that the application intends to access. When an application encounters an unavailable component, the recovery engine provides a recovery action to the application which instructs the application how to proceed, such as accessing a backup component. The recovery engine tracks unavailable components and, when a subsequent application registers that intends to use an unavailable component, the recovery engine provides the subsequent application a recovery action, instructing the subsequent application how to proceed.
    Type: Grant
    Filed: June 12, 2007
    Date of Patent: May 19, 2009
    Assignee: International Business Machines Corporation
    Inventors: Peter Alan Coldicott, George M. Galambos, Raman Harishankar, Kerrie Lamont Holley, Edward Emile Kelley
  • Publication number: 20080221940
    Abstract: The method and system uses the component business model as a framework for locating business activities. Business value drivers are identified, related in an influence model, and structured into a prioritized driver tree. The driver tree is used to determine the relative contributions of leaf drivers to the overall value of the business. Business activities contributing to the leaf drivers are then identified, and the relative contributions of the leaf drivers are allocated to the business activities and then rolled up to the components for display as a heat map overlay on a component map.
    Type: Application
    Filed: March 8, 2007
    Publication date: September 11, 2008
    Inventors: David L. Cohn, Robert Delamarter Dill, George M. Galambos, Robert H. Guttman, Raman Harishankar, David Robert Kress, Clifford Alan Pickover, Simon Plackett, Guy Jonathan James Rackham, Shanker Ramamurthy, John R. Smith, Stephen Michael Smith, John George Vergo
  • Publication number: 20080215882
    Abstract: Security levels are assigned to a shared component. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager encounters a shared component, the workflow manager uses the security tracking table entries in order to determine a security level to assign the shared component. The workflow manager assigns the determined security level to the shared component, and invokes the shared component to execute the corresponding process step.
    Type: Application
    Filed: May 7, 2008
    Publication date: September 4, 2008
    Inventors: Peter Alan Coldicott, George M. Galambos, Raman Harishankar, Kerrie Lamont Holley, Edward Emile Kelley
  • Publication number: 20080215398
    Abstract: A method and system are described for using the structure and relationships between components in a component business model of an enterprise to assign components providing monitoring data to a management component. In response to the monitoring data, the management component executes a business rule invoking a service that alters a behavior of the enterprise. The management component contains data rules limiting the information provided by the assigned components, analysis rules defining the interaction between components, and report rules for consolidating recommendations for altering behavior of the enterprise, including decisions to invest in certain aspects of the business, to reengineer certain processes of the business, and to alter operation of certain aspects of the business.
    Type: Application
    Filed: March 24, 2008
    Publication date: September 4, 2008
    Inventors: David L. Cohn, Robert Delamarter Dill, David Bernard Flaxer, George M. Galambos, Robert H. Guttman, Raman Harishankar, David Robert Kress, Clifford Alan Pickover, Guy Jonathan James Rackham, Shanker Ramamurthy, John R. Smith, Stephen Michael Smith, John George Vergo
  • Publication number: 20080201195
    Abstract: A system and method are described for using a Component Business Model (CBM) to transform a business. A CBM map is used to identify components that collaborate to provide a specified capability, and a repository supporting the CBM map is filtered to provide a view of the identified components that highlights how they collaborate. The view is used to identify component features contributing to the specified capability. The specified capability is then enhanced by a transformation strategy that includes re-engineering particular components, identifying a pattern characterizing the collaboration between components and adding a component to perform the collaborative pattern, and/or adding an additional feature to the collaboration and adding component to perform the additional feature. The CBM repository provides exemplar best practices that can be adapted for use in a re-engineered component.
    Type: Application
    Filed: March 25, 2008
    Publication date: August 21, 2008
    Inventors: David L. COHN, Robert Delamarter Dill, George M. Galambos, Robert H. Guttman, Raman Harishankar, David Robert Kress, Clifford Alan Pickover, Guy Jonathan James Rackham, John R. Smith, Stephen Michael Smith, John George Vergo
  • Patent number: 7386724
    Abstract: Assigning security levels to a shared component is presented. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager encounters a shared component, the workflow manager uses the security tracking table entries in order to determine a security level to assign the shared component. The workflow manager assigns the determined security level to the shared component, and invokes the shared component to execute the corresponding process step.
    Type: Grant
    Filed: June 17, 2004
    Date of Patent: June 10, 2008
    Assignee: International Business Machines Corporation
    Inventors: Peter Alan Coldicott, George M. Galambos, Raman Harishankar, Kerrie Lamont Holley, Edward Emile Kelley
  • Publication number: 20080082863
    Abstract: A system and method for maintaining functionality during component failures is presented. During application registration, a recovery engine generates a recovery plan for the application. The recovery plan includes recovery actions that correspond to each component that the application intends to access. When an application encounters an unavailable component, the recovery engine provides a recovery action to the application which instructs the application how to proceed, such as accessing a backup component. The recovery engine tracks unavailable components and, when a subsequent application registers that intends to use an unavailable component, the recovery engine provides the subsequent application a recovery action, instructing the subsequent application how to proceed.
    Type: Application
    Filed: June 12, 2007
    Publication date: April 3, 2008
    Inventors: Peter Coldicott, George Galambos, Raman Harishankar, Kerrie Holley, Edward Kelley
  • Patent number: 7340651
    Abstract: A system and method for maintaining functionality during component failures is presented. During application registration, a recovery engine generates a recovery plan for the application. The recovery plan includes recovery actions that correspond to each component that the application intends to access. When an application encounters an unavailable component, the recovery engine provides a recovery action to the application which instructs the application how to proceed, such as accessing a backup component. The recovery engine tracks unavailable components and, when a subsequent application registers that intends to use an unavailable component, the recovery engine provides the subsequent application a recovery action, instructing the subsequent application how to proceed.
    Type: Grant
    Filed: May 28, 2004
    Date of Patent: March 4, 2008
    Assignee: International Business Machines Corporation
    Inventors: Peter Alan Coldicott, George M. Galambos, Raman Harishankar, Kerrie Lamont Holley, Edward Emile Kelley
  • Publication number: 20070174109
    Abstract: A system and method are described for using a Component Business Model (CBM) to transform a business. A CBM map is used to identify components that collaborate to provide a specified capability, and a repository supporting the CBM map is filtered to provide a view of the identified components that highlights how they collaborate. The view is used to identify component features contributing to the specified capability. The specified capability is then enhanced by a transformation strategy that includes re-engineering particular components, identifying a pattern characterizing the collaboration between components and adding a component to perform the collaborative pattern, and/or adding an additional feature to the collaboration and adding component to perform the additional feature. The CBM repository provides exemplar best practices that can be adapted for use in a re-engineered component.
    Type: Application
    Filed: March 8, 2007
    Publication date: July 26, 2007
    Inventors: David Cohn, Robert Dill, George Galambos, Robert Guttman, Raman Harishankar, David Kress, Clifford Pickover, Guy Jonathan Rackham, John Smith, Stephen Smith, John Vergo
  • Publication number: 20070038627
    Abstract: A method and system are described for using the structure and relationships between components in a component business model of an enterprise to assign components providing monitoring data to a management component. In response to the monitoring data, the management component executes a business rule invoking a service that alters a behavior of the enterprise. The management component contains data rules limiting the information provided by the assigned components, analysis rules defining the interaction between components, and report rules for consolidating recommendations for altering behavior of the enterprise, including decisions to invest in certain aspects of the business, to reengineer certain processes of the business, and to alter operation of certain aspects of the business.
    Type: Application
    Filed: August 12, 2005
    Publication date: February 15, 2007
    Inventors: David Cohn, Robert Dill, David Flaxer, George Galambos, Robert Guttman, Raman Harishankar, David Kress, Clifford Pickover, Guy Rackham, Shanker Ramamurthy, John Smith, Stephen Smith, John Vergo
  • Publication number: 20070027701
    Abstract: A system and method is described for using a component business model to partition a business into non-overlapping components, and then allocating different components to appropriate organizing strategies, based on attribute values assigned to each component. In the best mode of implementation there are two attributes: whether or not the component differentiates the business within the market place; and whether the component is industry standard or is tailored by the organization. These attributes and their values map the components of the business to a matrix. Based on the combination of attribute values in each cell of the matrix, available organizing strategies are also mapped to the matrix, thereby identifying for each component an appropriate organizing strategy.
    Type: Application
    Filed: July 15, 2005
    Publication date: February 1, 2007
    Inventors: David Cohn, Robert Dill, David Flaxer, George Galambos, Robert Guttman, Raman Harishankar, David Kress, Christopher Murasso, Jeffrey Neville, Clifford Pickover, George Pohle, Guy Rackham, Shanker Ramamurthy, John Smith, Stephen Smith, Laurie Tropiano, John Vergo