Patents by Inventor Shailaja Mallya
Shailaja Mallya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11558395Abstract: Techniques for ensuring the security of cognitive insights are disclosed. A request to generate a cognitive insight is received from a requestor. The requestor is associated with a requestor data security level. The cognitive insight is generated using a first machine learning model and a plurality of data sources, each data source associated with a respective data security level. An insight data security level for the generated cognitive insight is identified based on the insight and the plurality of data sources. A first data security level associated with a data source of the plurality of data sources is modified, based on the identified insight data security level. It is determined, based on the requestor data security level and the insight data security level, that the requestor is authorized to access the generated insight. In response the generated insight is provided to the requestor.Type: GrantFiled: May 6, 2020Date of Patent: January 17, 2023Assignee: International Business Machines CorporationInventor: Shailaja Mallya
-
Publication number: 20220309167Abstract: A cluster is scanned. The cluster includes one or more virtual machines. A first content file change is detected based on the scan of the cluster. The first content file change is to a first content file. The first content file is located on a first virtual machine related to the cluster. A content-based security level of the cluster is determined based on the detection of the first content file change. The determined content-based security level of the cluster is compared to a security level standard of the cluster. A security gap is identified based on the comparison of the determined content-based security level to the security level standard of the cluster. In response to the identification of the security gap, an update to the security settings of the cluster is performed.Type: ApplicationFiled: June 15, 2022Publication date: September 29, 2022Inventor: Shailaja Mallya
-
Patent number: 11334672Abstract: A cluster is scanned. The cluster includes one or more virtual machines. A first content file change is detected based on the scan of the cluster. The first content file change is to a first content file. The first content file is located on a first virtual machine related to the cluster. A content-based security level of the cluster is determined based on the detection of the first content file change. The determined content-based security level of the cluster is compared to a security level standard of the cluster. A security gap is identified based on the comparison of the determined content-based security level to the security level standard of the cluster. In response to the identification of the security gap, an update to the security settings of the cluster is performed.Type: GrantFiled: November 22, 2019Date of Patent: May 17, 2022Assignee: International Business Machines CorporationInventor: Shailaja Mallya
-
Patent number: 11200325Abstract: Embodiments disclosed herein identify a first data asset that is associated with a non-optimized security configuration, based at least in part on metadata associated with the first data asset. Additionally, an optimized security configuration is generated for the first data asset by processing the metadata associated with the first data asset using one or more machine learning models. Furthermore, the optimized security configuration is applied to the first data asset.Type: GrantFiled: April 9, 2018Date of Patent: December 14, 2021Assignee: International Business Machines CorporationInventors: Shailaja Mallya, Nayna Jain, Divya K. Konoor, Pavitra Maras
-
Publication number: 20210352078Abstract: Techniques for ensuring the security of cognitive insights are disclosed. A request to generate a cognitive insight is received from a requestor. The requestor is associated with a requestor data security level. The cognitive insight is generated using a first machine learning model and a plurality of data sources, each data source associated with a respective data security level. An insight data security level for the generated cognitive insight is identified based on the insight and the plurality of data sources. A first data security level associated with a data source of the plurality of data sources is modified, based on the identified insight data security level. It is determined, based on the requestor data security level and the insight data security level, that the requestor is authorized to access the generated insight. In response the generated insight is provided to the requestor.Type: ApplicationFiled: May 6, 2020Publication date: November 11, 2021Inventor: Shailaja MALLYA
-
Patent number: 11025673Abstract: Disclosed aspects relate to compliance configuration management for asset migration on a shared pool of configurable computing resources having a set of compute nodes. A migration request to migrate an asset coupled with a first compliance configuration from a source compute node to a target compute node may be detected. The first compliance configuration coupled with the asset on the source compute node may be compared with an expected compliance configuration for the target compute node. Based on and in response to the comparing, a mismatch of the first compliance configuration with respect to the expected compliance configuration may be determined. A set of response actions may be performed with respect to the migration request.Type: GrantFiled: June 25, 2019Date of Patent: June 1, 2021Assignee: International Business Machines CorporationInventor: Shailaja Mallya
-
Publication number: 20210157923Abstract: A cluster is scanned. The cluster includes one or more virtual machines. A first content file change is detected based on the scan of the cluster. The first content file change is to a first content file. The first content file is located on a first virtual machine related to the cluster. A content-based security level of the cluster is determined based on the detection of the first content file change. The determined content-based security level of the cluster is compared to a security level standard of the cluster. A security gap is identified based on the comparison of the determined content-based security level to the security level standard of the cluster. In response to the identification of the security gap, an update to the security settings of the cluster is performed.Type: ApplicationFiled: November 22, 2019Publication date: May 27, 2021Inventor: Shailaja Mallya
-
Publication number: 20190312912Abstract: Disclosed aspects relate to compliance configuration management for asset migration on a shared pool of configurable computing resources having a set of compute nodes. A migration request to migrate an asset coupled with a first compliance configuration from a source compute node to a target compute node may be detected. The first compliance configuration coupled with the asset on the source compute node may be compared with an expected compliance configuration for the target compute node. Based on and in response to the comparing, a mismatch of the first compliance configuration with respect to the expected compliance configuration may be determined. A set of response actions may be performed with respect to the migration request.Type: ApplicationFiled: June 25, 2019Publication date: October 10, 2019Inventor: Shailaja Mallya
-
Publication number: 20190311137Abstract: Embodiments disclosed herein identify a first data asset that is associated with a non-optimized security configuration, based at least in part on metadata associated with the first data asset. Additionally, an optimized security configuration is generated for the first data asset by processing the metadata associated with the first data asset using one or more machine learning models. Furthermore, the optimized security configuration is applied to the first data asset.Type: ApplicationFiled: April 9, 2018Publication date: October 10, 2019Inventors: Shailaja MALLYA, Nayna JAIN, Divya K. KONOOR, Pavitra MARAS
-
Patent number: 10375115Abstract: Disclosed aspects relate to compliance configuration management for asset migration on a shared pool of configurable computing resources having a set of compute nodes. A migration request to migrate an asset coupled with a first compliance configuration from a source compute node to a target compute node may be detected. The first compliance configuration coupled with the asset on the source compute node may be compared with an expected compliance configuration for the target compute node. Based on and in response to the comparing, a mismatch of the first compliance configuration with respect to the expected compliance configuration may be determined. A set of response actions may be performed with respect to the migration request.Type: GrantFiled: July 27, 2016Date of Patent: August 6, 2019Assignee: International Business Machines CorporationInventor: Shailaja Mallya
-
Patent number: 10346327Abstract: A system and computer program product are provided for optimized timer placement. A request to apply a new timer in a computer system is received and an interrupt time for the new timer is extracted from the new timer. A timer list is accessed for each processor in the system responsive to the received request. A range for placement of the new timer is established with respect to each of the accessed timer lists. A timer expiry delay is calculated between proximal processor interrupts and the extracted interrupt time based on the established range placement. Proximity of the extracted interrupt time within the existing processor interrupts is determined and one of the processors is selected based on the calculation and the determined proximity. The new timer is placed on the selected processor.Type: GrantFiled: March 22, 2017Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Juan M. Casas, Jr., Nikhil Hegde, Keerthi B. Kumar, Shailaja Mallya
-
Patent number: 10346329Abstract: A method is provided for optimized timer placement. A request to apply a new timer in a computer system is received and an interrupt time for the new timer is extracted from the new timer. A timer list is accessed for each processor in the system responsive to the received request. A range for placement of the new timer is established with respect to each of the accessed timer lists. A timer expiry delay is calculated between proximal processor interrupts and the extracted interrupt time based on the established range placement. Proximity of the extracted interrupt time within the existing processor interrupts is determined and one of the processors is selected based on the calculation and the determined proximity. The new timer is placed on the selected processor.Type: GrantFiled: October 24, 2017Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Juan M. Casas, Jr., Nikhil Hegde, Keerthi B. Kumar, Shailaja Mallya
-
Patent number: 10256975Abstract: An embodiment of the invention may include a method, computer program product and system for data transfer. The embodiment may include receiving, by a relay node, a data payload from a data sending program intended for a data receiving program. The embodiment may include determining whether the received data payload is numeric data or non-numeric data based on a payload length associated with the received data payload. The embodiment may include creating a corrected data payload by performing at least one cognitive correction to the non-numeric data payload based on determining that the received data payload contains non-numeric data. The embodiment may include transmitting the corrected data payload.Type: GrantFiled: February 28, 2017Date of Patent: April 9, 2019Assignee: International Business Machines CorporationInventor: Shailaja Mallya
-
Patent number: 10223146Abstract: Disclosed aspects relate to rearrangement management for a shared pool of configurable computing resources including a source asset, a target asset, and a memory device having a set of data. A first subset of the set of data on the memory device may be locked with respect to modification. A first set of logical address identifiers for the first subset of the set of data on the memory device may be identified in a hypervisor mapping table in a first set of source entries for the source asset. The first set of logical address identifiers for the first subset of the set of data on the memory device may be established in the hypervisor mapping table in a first set of target entries for the target asset. The first subset of the set of data on the memory device may be unlocked with respect to modification.Type: GrantFiled: July 26, 2016Date of Patent: March 5, 2019Assignee: International Business Machines CorporationInventors: Amit Agarwal, Uma Maheswara R. Chandolu, Chetan L. Gaonkar, Shailaja Mallya
-
Publication number: 20180276156Abstract: A method is provided for optimized timer placement. A request to apply a new timer in a computer system is received and an interrupt time for the new timer is extracted from the new timer. A timer list is accessed for each processor in the system responsive to the received request. A range for placement of the new timer is established with respect to each of the accessed timer lists. A timer expiry delay is calculated between proximal processor interrupts and the extracted interrupt time based on the established range placement. Proximity of the extracted interrupt time within the existing processor interrupts is determined and one of the processors is selected based on the calculation and the determined proximity. The new timer is placed on the selected processor.Type: ApplicationFiled: October 24, 2017Publication date: September 27, 2018Applicant: International Business Machines CorporationInventors: Juan M. Casas, JR., Nikhil Hegde, Keerthi B. Kumar, Shailaja Mallya
-
Publication number: 20180276155Abstract: A system and computer program product are provided for optimized timer placement. A request to apply a new timer in a computer system is received and an interrupt time for the new timer is extracted from the new timer. A timer list is accessed for each processor in the system responsive to the received request. A range for placement of the new timer is established with respect to each of the accessed timer lists. A timer expiry delay is calculated between proximal processor interrupts and the extracted interrupt time based on the established range placement. Proximity of the extracted interrupt time within the existing processor interrupts is determined and one of the processors is selected based on the calculation and the determined proximity. The new timer is placed on the selected processor.Type: ApplicationFiled: March 22, 2017Publication date: September 27, 2018Applicant: International Business Machines CorporationInventors: Juan M. Casas, JR., Nikhil Hegde, Keerthi B. Kumar, Shailaja Mallya
-
Publication number: 20180248696Abstract: An embodiment of the invention may include a method, computer program product and system for data transfer. The embodiment may include receiving, by a relay node, a data payload from a data sending program intended for a data receiving program. The embodiment may include determining whether the received data payload is numeric data or non-numeric data based on a payload length associated with the received data payload. The embodiment may include creating a corrected data payload by performing at least one cognitive correction to the non-numeric data payload based on determining that the received data payload contains non-numeric data. The embodiment may include transmitting the corrected data payload.Type: ApplicationFiled: February 28, 2017Publication date: August 30, 2018Inventor: Shailaja Mallya
-
Patent number: 9904473Abstract: A page type may be identified for each of a plurality of memory pages, the page type corresponding to a particular process that accesses a particular memory page of the plurality of memory pages. The plurality of memory pages may each respectively include duplicate data. The duplicate data may be a same set of data values. Each of the plurality of respective memory pages may be ranked as candidates to deduplicate the set of data values to. The ranking may be based on at least the page type. In response to identifying the first processor and identifying a first memory device, the duplicate data may be deduplicated from the plurality of memory pages to a highest ranked memory page. The deduplication may correspond to coalescing the duplicate data to the highest ranked memory page.Type: GrantFiled: November 20, 2015Date of Patent: February 27, 2018Assignee: International Business Machines CorporationInventors: Keerthi B. Kumar, Shailaja Mallya
-
Publication number: 20180032360Abstract: Disclosed aspects relate to rearrangement management for a shared pool of configurable computing resources including a source asset, a target asset, and a memory device having a set of data. A first subset of the set of data on the memory device may be locked with respect to modification. A first set of logical address identifiers for the first subset of the set of data on the memory device may be identified in a hypervisor mapping table in a first set of source entries for the source asset. The first set of logical address identifiers for the first subset of the set of data on the memory device may be established in the hypervisor mapping table in a first set of target entries for the target asset. The first subset of the set of data on the memory device may be unlocked with respect to modification.Type: ApplicationFiled: July 26, 2016Publication date: February 1, 2018Inventors: Amit Agarwal, Uma Maheswara R. Chandolu, Chetan L. Gaonkar, Shailaja Mallya
-
Publication number: 20180034856Abstract: Disclosed aspects relate to compliance configuration management for asset migration on a shared pool of configurable computing resources having a set of compute nodes. A migration request to migrate an asset coupled with a first compliance configuration from a source compute node to a target compute node may be detected. The first compliance configuration coupled with the asset on the source compute node may be compared with an expected compliance configuration for the target compute node. Based on and in response to the comparing, a mismatch of the first compliance configuration with respect to the expected compliance configuration may be determined. A set of response actions may be performed with respect to the migration request.Type: ApplicationFiled: July 27, 2016Publication date: February 1, 2018Inventor: Shailaja Mallya