Patents by Inventor Ravi K. Kosaraju

Ravi K. Kosaraju has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10255127
    Abstract: A computer implemented method and system for optimizing diagnostic data collection for a computerized issue tracking system. The method and system includes receiving a problem description from an origination system communicating with an issue tracking system. The problem description is analyzed for missing diagnostic data. A data collection scheme is identified to collect the missing diagnostic data. The data collection scheme is in accordance with a criteria for minimizing disruption of the origination system to collect the missing diagnostic data. The method and system includes communicating the missing diagnostic data to the issue tracking system.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: April 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath Makonahalli
  • Publication number: 20180018592
    Abstract: Techniques are described for identifying alternative venues for an activity. In one aspect, techniques include receiving information corresponding to an activity at a scheduled location and scheduled time; receiving a current location of the user prior to the scheduled time; calculating a probability of the user arriving at the scheduled location at the scheduled time; and responsive to determining the probability is less than a predetermined threshold, identifying an alternative venue for the activity having resources to support the activity.
    Type: Application
    Filed: July 15, 2016
    Publication date: January 18, 2018
    Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath Makonahalli
  • Patent number: 9734068
    Abstract: For browser cache cleanup, to consider for eviction a data item stored in a cache of a browser application in a device, a probability that the data item will be needed again during a period after the eviction is computed. A type is determined of a network that will be available at the device during the period. A cost is computed of obtaining the data item over a network of the type, from a location of the device during the period. Using the probability and the cost, a weight of the data item is computed. The weight is associated with the data item as a part of associating a set of weights with a set of data items in the cache. The data item is selected for eviction from the cache because the weight is a lowest weight in the set of weights.
    Type: Grant
    Filed: August 11, 2015
    Date of Patent: August 15, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
  • Patent number: 9678854
    Abstract: To identify a source of a memory leak in an application, a pattern of objects is identified in an object hierarchy of a heap dump, the pattern including an indication of the memory leak. The pattern is matched with a metadata of the application. A static entry in the metadata describes a relationship between a component of the application and an object of a class used in the component. A flow entry in the metadata describes a relationship between a pattern of instantiation of a set of objects corresponding to a set of classes and an operation performed using the application. When the pattern matches the flow entry in the flow section of the metadata, a conclusion is drawn that the memory leak is caused in the operation identified in the flow entry. A portion of a code that participates in the operation is selected for modification.
    Type: Grant
    Filed: May 15, 2015
    Date of Patent: June 13, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
  • Patent number: 9619397
    Abstract: For browser cache cleanup, to consider for eviction a data item stored in a cache of a browser application in a device, a probability that the data item will be needed again during a period after the eviction is computed. A type is determined of a network that will be available at the device during the period. A cost is computed of obtaining the data item over a network of the type, from a location of the device during the period. Using the probability and the cost, a weight of the data item is computed. The weight is associated with the data item as a part of associating a set of weights with a set of data items in the cache. The data item is selected for eviction from the cache because the weight is a lowest weight in the set of weights.
    Type: Grant
    Filed: October 28, 2015
    Date of Patent: April 11, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
  • Publication number: 20170091009
    Abstract: A computer implemented method and system for optimizing diagnostic data collection for a computerized issue tracking system. The method and system includes receiving a problem description from an origination system communicating with an issue tracking system. The problem description is analyzed for missing diagnostic data. A data collection scheme is identified to collect the missing diagnostic data. The data collection scheme is in accordance with a criteria for minimizing disruption of the origination system to collect the missing diagnostic data. The method and system includes communicating the missing diagnostic data to the issue tracking system.
    Type: Application
    Filed: September 30, 2015
    Publication date: March 30, 2017
    Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath Makonahalli
  • Patent number: 9577971
    Abstract: A system and method for reducing data usage for wireless subscription plans. An email and an attachment are downloaded to a first device of a first recipient. An attachment is identified on the email by an attachment processing service that ensures that sharing from the first device is based on a credit policy. That there is more than one recipient for the email and attachment is determined. That a second device of a second recipient is in the vicinity of the first device is determined. Verification of the second device is established with an email fingerprint exchange handshake based on a fingerprint of the email for the second recipient that is computed from a hash of content of the email, an identifier of the attachment, and an email id of the second recipient. A second network is utilized to copy the attachment from the first device to the second device.
    Type: Grant
    Filed: June 13, 2016
    Date of Patent: February 21, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
  • Publication number: 20170046269
    Abstract: For browser cache cleanup, to consider for eviction a data item stored in a cache of a browser application in a device, a probability that the data item will be needed again during a period after the eviction is computed. A type is determined of a network that will be available at the device during the period. A cost is computed of obtaining the data item over a network of the type, from a location of the device during the period. Using the probability and the cost, a weight of the data item is computed. The weight is associated with the data item as a part of associating a set of weights with a set of data items in the cache. The data item is selected for eviction from the cache because the weight is a lowest weight in the set of weights.
    Type: Application
    Filed: October 28, 2015
    Publication date: February 16, 2017
    Applicant: International Business Machines Corporation
    Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
  • Publication number: 20170046265
    Abstract: For browser cache cleanup, to consider for eviction a data item stored in a cache of a browser application in a device, a probability that the data item will be needed again during a period after the eviction is computed. A type is determined of a network that will be available at the device during the period. A cost is computed of obtaining the data item over a network of the type, from a location of the device during the period. Using the probability and the cost, a weight of the data item is computed. The weight is associated with the data item as a part of associating a set of weights with a set of data items in the cache. The data item is selected for eviction from the cache because the weight is a lowest weight in the set of weights.
    Type: Application
    Filed: August 11, 2015
    Publication date: February 16, 2017
    Applicant: International Business Machines Corporation
    Inventors: ANAMITRA BHATTACHARYYA, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
  • Publication number: 20160335169
    Abstract: To identify a source of a memory leak in an application, a pattern of objects is identified in an object hierarchy of a heap dump, the pattern including an indication of the memory leak. The pattern is matched with a metadata of the application. A static entry in the metadata describes a relationship between a component of the application and an object of a class used in the component. A flow entry in the metadata describes a relationship between a pattern of instantiation of a set of objects corresponding to a set of classes and an operation performed using the application. When the pattern matches the flow entry in the flow section of the metadata, a conclusion is drawn that the memory leak is caused in the operation identified in the flow entry. A portion of a code that participates in the operation is selected for modification.
    Type: Application
    Filed: May 15, 2015
    Publication date: November 17, 2016
    Applicant: International Business Machines Corporation
    Inventors: ANAMITRA BHATTACHARYYA, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
  • Publication number: 20160275421
    Abstract: In general, embodiments of the present invention provide an approach for evaluating a computer environment. Specifically, actual deployed components of the computer systems are discovered and cross-referenced against a pre-determined functional architecture to produce a new physical pattern model to determine whether critical functions within the computer environment are not implemented or whether deployed components within the computer environment are over or under capacity.
    Type: Application
    Filed: March 16, 2015
    Publication date: September 22, 2016
    Inventors: Christopher J. Dawson, Ravi K. Kosaraju, Baiju D. Mandalia, Madhusudan Ramakrishna
  • Patent number: 9424543
    Abstract: A method to authenticate an identity of a responder. The method includes receiving a request and determining, by one or more computer processors, a reviewer for the request. A custom key is generated for the reviewer and the request, and at least one URL is generated that contains the custom key. At least one URL is sent, along with the request, to the reviewer. Upon receiving a response to the request that includes a selection of one URL, it is determined whether the response was received from the determined reviewer for the request.
    Type: Grant
    Filed: September 27, 2012
    Date of Patent: August 23, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric Anderson, Christopher J. Dawson, Ravi K. Kosaraju, Rajesh Radhakrishnan
  • Patent number: 9419734
    Abstract: A system and method of controlling a portable radio may involve tuning a first receiver of the portable radio to a first broadcast from a first station, where the first broadcast includes specific program content. A switching event can be detected at the portable radio, where a second receiver of the portable radio may be tuned to a second broadcast from a second station in response to the switching event. The second broadcast can include the specific program content.
    Type: Grant
    Filed: June 15, 2009
    Date of Patent: August 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Lama R. Abouchakra, Al Chakra, Lisa Seacat DeLuca, Ravi K. Kosaraju, Julie A. Meserve, Stephen M. Meserve, Steven M. Miller, Mark E. Peters
  • Patent number: 9386092
    Abstract: A method for reducing data usage for wireless subscription plans. An email and an attachment are downloaded to a first device of a first recipient. An attachment is identified on the email by an attachment processing service that ensures that sharing from the first device is based on a credit policy. That there is more than one recipient for the email and attachment is determined. That a second device of a second recipient is in the vicinity of the first device is determined. Verification of the second device is established with an email fingerprint exchange handshake based on a fingerprint of the email for the second recipient that is computed from a hash of content of the email, an identifier of the attachment, and an email id of the second recipient. A second network is utilized to copy the attachment from the first device to the second device.
    Type: Grant
    Filed: January 12, 2016
    Date of Patent: July 5, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
  • Patent number: 9276943
    Abstract: Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change.
    Type: Grant
    Filed: October 25, 2013
    Date of Patent: March 1, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Krishnamohan Dantam, Ravi K. Kosaraju
  • Publication number: 20150121463
    Abstract: Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change.
    Type: Application
    Filed: October 25, 2013
    Publication date: April 30, 2015
    Applicant: International Business Machines Corporation
    Inventors: Eric M. Anderson, Krishnamohan Dantam, Ravi K. Kosaraju
  • Patent number: 8938722
    Abstract: A method and apparatus for locating errors is disclosed. A computer inserts an object reference into program code suspected of causing an error, the object reference having an initial class name. Responsive to execution of the program code, the computer generates a new class name for the object reference comprising the context information. The computer sets an object with the new class name as the object reference inserted into the program code suspected of causing the error, wherein the new class name of the object is located in computer memory in use by the executing program code. The computer then creates a record of the computer memory in use by the executing program code, the record including the context information in the form of the new class name of the object.
    Type: Grant
    Filed: October 17, 2012
    Date of Patent: January 20, 2015
    Assignee: International Business Machines Corporation
    Inventors: Krishnamohan Dantam, Ravi K. Kosaraju
  • Patent number: 8917840
    Abstract: A first telephone number assigned to the first telephone is cryptographically hashed to generate a first message digest, and the first telephone sends a signal to a second telephone over a communication network, wherein the signal includes the first message digest. The second telephone receives the first signal and searches its contact records to determine whether a telephone number in one of the contact records generates a message digest that matches the message digest received. Then, in response to the second telephone determining that a telephone number in one of the contact records generates a message digest that matches the first message digest, the second telephone identifies the contact record that generates the matching message digest and provides audible or visual output of content from the identified contact record.
    Type: Grant
    Filed: December 14, 2009
    Date of Patent: December 23, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ravi K. Kosaraju, William G. Pagan
  • Publication number: 20140189526
    Abstract: In a method for changing log file content generation, a computer extracts content of a log file. The content was generated by one or more computer programs at run-time. The content comprises a plurality of portions. The computer causes the extracted content to be displayed in a user interface. The computer detects a user interaction in the user interface. The user interaction manipulates at least one of the portions. The computer generates a rule for generating future log file content, wherein the generated rule is based on the user interaction in the user interface.
    Type: Application
    Filed: January 2, 2013
    Publication date: July 3, 2014
    Applicant: International Business Machines Corporation
    Inventors: Danny Y. Chen, Ravi K. Kosaraju, Fabian F. Morgan
  • Publication number: 20140109065
    Abstract: A method and apparatus for locating errors is disclosed. A computer inserts an object reference into program code suspected of causing an error, the object reference having an initial class name. Responsive to execution of the program code, the computer generates a new class name for the object reference comprising the context information. The computer sets an object with the new class name as the object reference inserted into the program code suspected of causing the error, wherein the new class name of the object is located in computer memory in use by the executing program code. The computer then creates a record of the computer memory in use by the executing program code, the record including the context information in the form of the new class name of the object.
    Type: Application
    Filed: October 17, 2012
    Publication date: April 17, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Krishnamohan Dantam, Ravi K. Kosaraju