Patents by Inventor Ravi K. Kosaraju
Ravi K. Kosaraju has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10255127Abstract: A computer implemented method and system for optimizing diagnostic data collection for a computerized issue tracking system. The method and system includes receiving a problem description from an origination system communicating with an issue tracking system. The problem description is analyzed for missing diagnostic data. A data collection scheme is identified to collect the missing diagnostic data. The data collection scheme is in accordance with a criteria for minimizing disruption of the origination system to collect the missing diagnostic data. The method and system includes communicating the missing diagnostic data to the issue tracking system.Type: GrantFiled: September 30, 2015Date of Patent: April 9, 2019Assignee: International Business Machines CorporationInventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath Makonahalli
-
Publication number: 20180018592Abstract: Techniques are described for identifying alternative venues for an activity. In one aspect, techniques include receiving information corresponding to an activity at a scheduled location and scheduled time; receiving a current location of the user prior to the scheduled time; calculating a probability of the user arriving at the scheduled location at the scheduled time; and responsive to determining the probability is less than a predetermined threshold, identifying an alternative venue for the activity having resources to support the activity.Type: ApplicationFiled: July 15, 2016Publication date: January 18, 2018Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath Makonahalli
-
Patent number: 9734068Abstract: For browser cache cleanup, to consider for eviction a data item stored in a cache of a browser application in a device, a probability that the data item will be needed again during a period after the eviction is computed. A type is determined of a network that will be available at the device during the period. A cost is computed of obtaining the data item over a network of the type, from a location of the device during the period. Using the probability and the cost, a weight of the data item is computed. The weight is associated with the data item as a part of associating a set of weights with a set of data items in the cache. The data item is selected for eviction from the cache because the weight is a lowest weight in the set of weights.Type: GrantFiled: August 11, 2015Date of Patent: August 15, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
-
Patent number: 9678854Abstract: To identify a source of a memory leak in an application, a pattern of objects is identified in an object hierarchy of a heap dump, the pattern including an indication of the memory leak. The pattern is matched with a metadata of the application. A static entry in the metadata describes a relationship between a component of the application and an object of a class used in the component. A flow entry in the metadata describes a relationship between a pattern of instantiation of a set of objects corresponding to a set of classes and an operation performed using the application. When the pattern matches the flow entry in the flow section of the metadata, a conclusion is drawn that the memory leak is caused in the operation identified in the flow entry. A portion of a code that participates in the operation is selected for modification.Type: GrantFiled: May 15, 2015Date of Patent: June 13, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
-
Patent number: 9619397Abstract: For browser cache cleanup, to consider for eviction a data item stored in a cache of a browser application in a device, a probability that the data item will be needed again during a period after the eviction is computed. A type is determined of a network that will be available at the device during the period. A cost is computed of obtaining the data item over a network of the type, from a location of the device during the period. Using the probability and the cost, a weight of the data item is computed. The weight is associated with the data item as a part of associating a set of weights with a set of data items in the cache. The data item is selected for eviction from the cache because the weight is a lowest weight in the set of weights.Type: GrantFiled: October 28, 2015Date of Patent: April 11, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
-
Publication number: 20170091009Abstract: A computer implemented method and system for optimizing diagnostic data collection for a computerized issue tracking system. The method and system includes receiving a problem description from an origination system communicating with an issue tracking system. The problem description is analyzed for missing diagnostic data. A data collection scheme is identified to collect the missing diagnostic data. The data collection scheme is in accordance with a criteria for minimizing disruption of the origination system to collect the missing diagnostic data. The method and system includes communicating the missing diagnostic data to the issue tracking system.Type: ApplicationFiled: September 30, 2015Publication date: March 30, 2017Inventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath Makonahalli
-
Patent number: 9577971Abstract: A system and method for reducing data usage for wireless subscription plans. An email and an attachment are downloaded to a first device of a first recipient. An attachment is identified on the email by an attachment processing service that ensures that sharing from the first device is based on a credit policy. That there is more than one recipient for the email and attachment is determined. That a second device of a second recipient is in the vicinity of the first device is determined. Verification of the second device is established with an email fingerprint exchange handshake based on a fingerprint of the email for the second recipient that is computed from a hash of content of the email, an identifier of the attachment, and an email id of the second recipient. A second network is utilized to copy the attachment from the first device to the second device.Type: GrantFiled: June 13, 2016Date of Patent: February 21, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
-
Publication number: 20170046269Abstract: For browser cache cleanup, to consider for eviction a data item stored in a cache of a browser application in a device, a probability that the data item will be needed again during a period after the eviction is computed. A type is determined of a network that will be available at the device during the period. A cost is computed of obtaining the data item over a network of the type, from a location of the device during the period. Using the probability and the cost, a weight of the data item is computed. The weight is associated with the data item as a part of associating a set of weights with a set of data items in the cache. The data item is selected for eviction from the cache because the weight is a lowest weight in the set of weights.Type: ApplicationFiled: October 28, 2015Publication date: February 16, 2017Applicant: International Business Machines CorporationInventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
-
Publication number: 20170046265Abstract: For browser cache cleanup, to consider for eviction a data item stored in a cache of a browser application in a device, a probability that the data item will be needed again during a period after the eviction is computed. A type is determined of a network that will be available at the device during the period. A cost is computed of obtaining the data item over a network of the type, from a location of the device during the period. Using the probability and the cost, a weight of the data item is computed. The weight is associated with the data item as a part of associating a set of weights with a set of data items in the cache. The data item is selected for eviction from the cache because the weight is a lowest weight in the set of weights.Type: ApplicationFiled: August 11, 2015Publication date: February 16, 2017Applicant: International Business Machines CorporationInventors: ANAMITRA BHATTACHARYYA, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
-
Publication number: 20160335169Abstract: To identify a source of a memory leak in an application, a pattern of objects is identified in an object hierarchy of a heap dump, the pattern including an indication of the memory leak. The pattern is matched with a metadata of the application. A static entry in the metadata describes a relationship between a component of the application and an object of a class used in the component. A flow entry in the metadata describes a relationship between a pattern of instantiation of a set of objects corresponding to a set of classes and an operation performed using the application. When the pattern matches the flow entry in the flow section of the metadata, a conclusion is drawn that the memory leak is caused in the operation identified in the flow entry. A portion of a code that participates in the operation is selected for modification.Type: ApplicationFiled: May 15, 2015Publication date: November 17, 2016Applicant: International Business Machines CorporationInventors: ANAMITRA BHATTACHARYYA, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
-
Publication number: 20160275421Abstract: In general, embodiments of the present invention provide an approach for evaluating a computer environment. Specifically, actual deployed components of the computer systems are discovered and cross-referenced against a pre-determined functional architecture to produce a new physical pattern model to determine whether critical functions within the computer environment are not implemented or whether deployed components within the computer environment are over or under capacity.Type: ApplicationFiled: March 16, 2015Publication date: September 22, 2016Inventors: Christopher J. Dawson, Ravi K. Kosaraju, Baiju D. Mandalia, Madhusudan Ramakrishna
-
Patent number: 9424543Abstract: A method to authenticate an identity of a responder. The method includes receiving a request and determining, by one or more computer processors, a reviewer for the request. A custom key is generated for the reviewer and the request, and at least one URL is generated that contains the custom key. At least one URL is sent, along with the request, to the reviewer. Upon receiving a response to the request that includes a selection of one URL, it is determined whether the response was received from the determined reviewer for the request.Type: GrantFiled: September 27, 2012Date of Patent: August 23, 2016Assignee: International Business Machines CorporationInventors: Eric Anderson, Christopher J. Dawson, Ravi K. Kosaraju, Rajesh Radhakrishnan
-
Patent number: 9419734Abstract: A system and method of controlling a portable radio may involve tuning a first receiver of the portable radio to a first broadcast from a first station, where the first broadcast includes specific program content. A switching event can be detected at the portable radio, where a second receiver of the portable radio may be tuned to a second broadcast from a second station in response to the switching event. The second broadcast can include the specific program content.Type: GrantFiled: June 15, 2009Date of Patent: August 16, 2016Assignee: International Business Machines CorporationInventors: Lama R. Abouchakra, Al Chakra, Lisa Seacat DeLuca, Ravi K. Kosaraju, Julie A. Meserve, Stephen M. Meserve, Steven M. Miller, Mark E. Peters
-
Patent number: 9386092Abstract: A method for reducing data usage for wireless subscription plans. An email and an attachment are downloaded to a first device of a first recipient. An attachment is identified on the email by an attachment processing service that ensures that sharing from the first device is based on a credit policy. That there is more than one recipient for the email and attachment is determined. That a second device of a second recipient is in the vicinity of the first device is determined. Verification of the second device is established with an email fingerprint exchange handshake based on a fingerprint of the email for the second recipient that is computed from a hash of content of the email, an identifier of the attachment, and an email id of the second recipient. A second network is utilized to copy the attachment from the first device to the second device.Type: GrantFiled: January 12, 2016Date of Patent: July 5, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anamitra Bhattacharyya, Krishnamohan Dantam, Ravi K. Kosaraju, Manjunath D. Makonahalli
-
Patent number: 9276943Abstract: Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change.Type: GrantFiled: October 25, 2013Date of Patent: March 1, 2016Assignee: International Business Machines CorporationInventors: Eric M. Anderson, Krishnamohan Dantam, Ravi K. Kosaraju
-
Publication number: 20150121463Abstract: Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change.Type: ApplicationFiled: October 25, 2013Publication date: April 30, 2015Applicant: International Business Machines CorporationInventors: Eric M. Anderson, Krishnamohan Dantam, Ravi K. Kosaraju
-
Patent number: 8938722Abstract: A method and apparatus for locating errors is disclosed. A computer inserts an object reference into program code suspected of causing an error, the object reference having an initial class name. Responsive to execution of the program code, the computer generates a new class name for the object reference comprising the context information. The computer sets an object with the new class name as the object reference inserted into the program code suspected of causing the error, wherein the new class name of the object is located in computer memory in use by the executing program code. The computer then creates a record of the computer memory in use by the executing program code, the record including the context information in the form of the new class name of the object.Type: GrantFiled: October 17, 2012Date of Patent: January 20, 2015Assignee: International Business Machines CorporationInventors: Krishnamohan Dantam, Ravi K. Kosaraju
-
Patent number: 8917840Abstract: A first telephone number assigned to the first telephone is cryptographically hashed to generate a first message digest, and the first telephone sends a signal to a second telephone over a communication network, wherein the signal includes the first message digest. The second telephone receives the first signal and searches its contact records to determine whether a telephone number in one of the contact records generates a message digest that matches the message digest received. Then, in response to the second telephone determining that a telephone number in one of the contact records generates a message digest that matches the first message digest, the second telephone identifies the contact record that generates the matching message digest and provides audible or visual output of content from the identified contact record.Type: GrantFiled: December 14, 2009Date of Patent: December 23, 2014Assignee: International Business Machines CorporationInventors: Ravi K. Kosaraju, William G. Pagan
-
Publication number: 20140189526Abstract: In a method for changing log file content generation, a computer extracts content of a log file. The content was generated by one or more computer programs at run-time. The content comprises a plurality of portions. The computer causes the extracted content to be displayed in a user interface. The computer detects a user interaction in the user interface. The user interaction manipulates at least one of the portions. The computer generates a rule for generating future log file content, wherein the generated rule is based on the user interaction in the user interface.Type: ApplicationFiled: January 2, 2013Publication date: July 3, 2014Applicant: International Business Machines CorporationInventors: Danny Y. Chen, Ravi K. Kosaraju, Fabian F. Morgan
-
Publication number: 20140109065Abstract: A method and apparatus for locating errors is disclosed. A computer inserts an object reference into program code suspected of causing an error, the object reference having an initial class name. Responsive to execution of the program code, the computer generates a new class name for the object reference comprising the context information. The computer sets an object with the new class name as the object reference inserted into the program code suspected of causing the error, wherein the new class name of the object is located in computer memory in use by the executing program code. The computer then creates a record of the computer memory in use by the executing program code, the record including the context information in the form of the new class name of the object.Type: ApplicationFiled: October 17, 2012Publication date: April 17, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Krishnamohan Dantam, Ravi K. Kosaraju