Patents by Inventor Ramratan Vennam

Ramratan Vennam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9459991
    Abstract: Embodiments of the present invention provide a method, system and computer program product for heap dump object identification in a heap dump analysis tool. In an embodiment of the invention, a method for heap dump object identification in a heap dump analysis tool can be provided. The method can include instrumenting an object with a uniquely identifiable marker, instantiating the instrumented object in a virtual machine executing in memory by a processor of a host computer and triggering a heap dump in the virtual machine. The method also can include parsing a heap dump file resulting from the triggered heap dump to locate a reference to the uniquely identifiable marker. Finally, the method can include displaying an association between the object and the heap dump file in a heap dump analysis tool executing in the memory by the processor of the host computer.
    Type: Grant
    Filed: December 31, 2009
    Date of Patent: October 4, 2016
    Assignee: International Business Machines Corporation
    Inventors: Ramratan Vennam, Patrick W. Wolf
  • Publication number: 20160202073
    Abstract: A user's travel is securely monitored using user-configured secure travel monitoring constraints within a secure travel profile. The user-configured secure travel monitoring constraints granularly specify controls related to user travel privacy and authorized release of travel information to a user-specified trusted third party in association with the user's travel, in addition to specifying a planned travel route and a planned travel time frame. A route deviation by the user relative to the planned travel route or planned travel time frame is detected during the secure monitoring of the user's travel. A user-configured level of travel information authorized by the user to be released to the user-specified trusted third party within a traveler safety alert responsive to the route deviation is determined based upon the user-configured secure travel monitoring constraints. The traveler safety alert with the user-configured level of travel information is sent to the user-specified trusted third party.
    Type: Application
    Filed: January 8, 2015
    Publication date: July 14, 2016
    Inventors: Matthew R. Claycomb, Trenton J. Johnson, James L. Lentz, Dana L. Price, Charmant K. Tan, Ramratan Vennam
  • Patent number: 9390323
    Abstract: Methods, systems, and computer program products relate to recommending sites including identifying a location associated with a computing device, analyzing metadata of geotagged image data, the image data including blocked image data, and suggesting sites near the identified location based on the results of the metadata analysis.
    Type: Grant
    Filed: May 18, 2015
    Date of Patent: July 12, 2016
    Assignee: International Business Machines Corporation
    Inventors: Michael T. Peters, Dana L. Price, James C. Riordan, Belinda M. Vennam, Ramratan Vennam
  • Patent number: 9047472
    Abstract: A method, system or computer usable program product for automatically removing sensitive content from a display responsive to removal of user physical proximity from a computer peripheral including utilizing a predefined policy stored in persistent memory for monitoring user interaction with a computer peripheral for a criterion, wherein the criterion is a removal of user contact with the computer peripheral, and responsive to detecting the criterion with a processor, performing a removal action related to displaying sensitive content according to the predefined policy.
    Type: Grant
    Filed: January 14, 2013
    Date of Patent: June 2, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James C. Riordan, Jack W. Szeto, Ramratan Vennam, Patrick W. Wolf
  • Publication number: 20150020183
    Abstract: A method for representing and controlling an impact and scope of a widget value includes displaying at least one widget on a user interface. The widget includes a value. The value includes an inherited value. The method also includes displaying information of a scope of inheritance of the value before user interaction with the widget. The information of the scope of inheritance of the value includes a number of inheritance levels of the value and a number of objects impacted by a change to the value. The method also includes receiving a user input changing the value of the widget. The method also includes changing the value of the widget and the objects in response to receiving the user input.
    Type: Application
    Filed: September 30, 2014
    Publication date: January 15, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James L Lentz, Dana L Price, Ramratan Vennam
  • Publication number: 20140351731
    Abstract: Dynamic display of hierarchical data in the form of a treemap. A first instance of an object representation is selected in a first visualization of a hierarchy encoded by containment. A second instance of the object representation is designated, wherein each instance is a tier for object occupation. An object within the hierarchy is displayed as a shape comprising at least two opposing surfaces, and the object is selected through the opposing surfaces. The hierarchy is dynamically re-ordered in response to the selection and designation, and the second representation of the hierarchy is displayed based on the dynamic re-ordering.
    Type: Application
    Filed: November 25, 2013
    Publication date: November 27, 2014
    Applicant: International Business Machines Corporation
    Inventors: Matthew R. Claycomb, Trenton J. Johnson, James L. Lentz, Dana L. Price, Charmant K. Tan, Ramratan Vennam
  • Publication number: 20140351730
    Abstract: Dynamic display of hierarchical data in the form of a treemap. A first instance of an object representation is selected in a first visualization of a hierarchy encoded by containment. A second instance of the object representation is designated, wherein each instance is a tier for object occupation. An object within the hierarchy is displayed as a shape comprising at least two opposing surfaces, and the object is selected through the opposing surfaces. The hierarchy is dynamically re-ordered in response to the selection and designation, and the second representation of the hierarchy is displayed based on the dynamic re-ordering.
    Type: Application
    Filed: May 21, 2013
    Publication date: November 27, 2014
    Applicant: International Business Machines Corporation
    Inventors: Matthew R. Claycomb, Trenton J. Johnson, James L. Lentz, Dana L. Price, Charmant K. Tan, Ramratan Vennam
  • Publication number: 20140337782
    Abstract: A value inheritance widget system includes a display device including a user interface, and a value impact engine coupled to the display device. The value impact engine is configured to display at least one widget on a user interface. The widget includes a value. The value comprises an inherited value. The value impact engine is further configured to display information of a scope of inheritance of the value before user interaction with the widget. The information of the scope of inheritance of the value includes a number of inheritance levels of the value and a number of objects impacted by a change to the value. The value impact engine is further configured to receive a user input changing the value of the widget and change the value of the widget and the objects in response to receiving the user input.
    Type: Application
    Filed: May 10, 2013
    Publication date: November 13, 2014
    Applicant: International Business Machines Corporation
    Inventors: James L. Lentz, Dana L. Price, Ramratan Vennam
  • Publication number: 20140201805
    Abstract: A method, system or computer usable program product for automatically removing sensitive content from a display responsive to removal of user physical proximity from a computer peripheral including utilizing a predefined policy stored in persistent memory for monitoring user interaction with a computer peripheral for a criterion, wherein the criterion is a removal of user contact with the computer peripheral, and responsive to detecting the criterion with a processor, performing a removal action related to displaying sensitive content according to the predefined policy.
    Type: Application
    Filed: January 14, 2013
    Publication date: July 17, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James C. Riordan, Jack W. Szeto, Ramratan Vennam, Patrick W. Wolf
  • Publication number: 20130074006
    Abstract: A user log-in to a system. An embodiment can include, during a user log-in to a system to access a view of a user interface to be presented on a display, receiving a user command to be executed prior to presenting the view on the display, wherein the user is not prompted to enter the user command. Responsive to the user command, the view can be configured in accordance with the user command. The view, as configured in accordance with the user command, can be presented on the display.
    Type: Application
    Filed: September 21, 2011
    Publication date: March 21, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: JACK W. SZETO, RAMRATAN VENNAM, PATRICK W. WOLF
  • Publication number: 20110161956
    Abstract: Embodiments of the present invention provide a method, system and computer program product for heap dump object identification in a heap dump analysis tool. In an embodiment of the invention, a method for heap dump object identification in a heap dump analysis tool can be provided. The method can include instrumenting an object with a uniquely identifiable marker, instantiating the instrumented object in a virtual machine executing in memory by a processor of a host computer and triggering a heap dump in the virtual machine. The method also can include parsing a heap dump file resulting from the triggered heap dump to locate a reference to the uniquely identifiable marker. Finally, the method can include displaying an association between the object and the heap dump file in a heap dump analysis tool executing in the memory by the processor of the host computer.
    Type: Application
    Filed: December 31, 2009
    Publication date: June 30, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ramratan Vennam, Patrick W. Wolf