Patents by Inventor Shailaja Mallya

Shailaja Mallya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11558395
    Abstract: Techniques for ensuring the security of cognitive insights are disclosed. A request to generate a cognitive insight is received from a requestor. The requestor is associated with a requestor data security level. The cognitive insight is generated using a first machine learning model and a plurality of data sources, each data source associated with a respective data security level. An insight data security level for the generated cognitive insight is identified based on the insight and the plurality of data sources. A first data security level associated with a data source of the plurality of data sources is modified, based on the identified insight data security level. It is determined, based on the requestor data security level and the insight data security level, that the requestor is authorized to access the generated insight. In response the generated insight is provided to the requestor.
    Type: Grant
    Filed: May 6, 2020
    Date of Patent: January 17, 2023
    Assignee: International Business Machines Corporation
    Inventor: Shailaja Mallya
  • Publication number: 20220309167
    Abstract: A cluster is scanned. The cluster includes one or more virtual machines. A first content file change is detected based on the scan of the cluster. The first content file change is to a first content file. The first content file is located on a first virtual machine related to the cluster. A content-based security level of the cluster is determined based on the detection of the first content file change. The determined content-based security level of the cluster is compared to a security level standard of the cluster. A security gap is identified based on the comparison of the determined content-based security level to the security level standard of the cluster. In response to the identification of the security gap, an update to the security settings of the cluster is performed.
    Type: Application
    Filed: June 15, 2022
    Publication date: September 29, 2022
    Inventor: Shailaja Mallya
  • Patent number: 11334672
    Abstract: A cluster is scanned. The cluster includes one or more virtual machines. A first content file change is detected based on the scan of the cluster. The first content file change is to a first content file. The first content file is located on a first virtual machine related to the cluster. A content-based security level of the cluster is determined based on the detection of the first content file change. The determined content-based security level of the cluster is compared to a security level standard of the cluster. A security gap is identified based on the comparison of the determined content-based security level to the security level standard of the cluster. In response to the identification of the security gap, an update to the security settings of the cluster is performed.
    Type: Grant
    Filed: November 22, 2019
    Date of Patent: May 17, 2022
    Assignee: International Business Machines Corporation
    Inventor: Shailaja Mallya
  • Patent number: 11200325
    Abstract: Embodiments disclosed herein identify a first data asset that is associated with a non-optimized security configuration, based at least in part on metadata associated with the first data asset. Additionally, an optimized security configuration is generated for the first data asset by processing the metadata associated with the first data asset using one or more machine learning models. Furthermore, the optimized security configuration is applied to the first data asset.
    Type: Grant
    Filed: April 9, 2018
    Date of Patent: December 14, 2021
    Assignee: International Business Machines Corporation
    Inventors: Shailaja Mallya, Nayna Jain, Divya K. Konoor, Pavitra Maras
  • Publication number: 20210352078
    Abstract: Techniques for ensuring the security of cognitive insights are disclosed. A request to generate a cognitive insight is received from a requestor. The requestor is associated with a requestor data security level. The cognitive insight is generated using a first machine learning model and a plurality of data sources, each data source associated with a respective data security level. An insight data security level for the generated cognitive insight is identified based on the insight and the plurality of data sources. A first data security level associated with a data source of the plurality of data sources is modified, based on the identified insight data security level. It is determined, based on the requestor data security level and the insight data security level, that the requestor is authorized to access the generated insight. In response the generated insight is provided to the requestor.
    Type: Application
    Filed: May 6, 2020
    Publication date: November 11, 2021
    Inventor: Shailaja MALLYA
  • Patent number: 11025673
    Abstract: Disclosed aspects relate to compliance configuration management for asset migration on a shared pool of configurable computing resources having a set of compute nodes. A migration request to migrate an asset coupled with a first compliance configuration from a source compute node to a target compute node may be detected. The first compliance configuration coupled with the asset on the source compute node may be compared with an expected compliance configuration for the target compute node. Based on and in response to the comparing, a mismatch of the first compliance configuration with respect to the expected compliance configuration may be determined. A set of response actions may be performed with respect to the migration request.
    Type: Grant
    Filed: June 25, 2019
    Date of Patent: June 1, 2021
    Assignee: International Business Machines Corporation
    Inventor: Shailaja Mallya
  • Publication number: 20210157923
    Abstract: A cluster is scanned. The cluster includes one or more virtual machines. A first content file change is detected based on the scan of the cluster. The first content file change is to a first content file. The first content file is located on a first virtual machine related to the cluster. A content-based security level of the cluster is determined based on the detection of the first content file change. The determined content-based security level of the cluster is compared to a security level standard of the cluster. A security gap is identified based on the comparison of the determined content-based security level to the security level standard of the cluster. In response to the identification of the security gap, an update to the security settings of the cluster is performed.
    Type: Application
    Filed: November 22, 2019
    Publication date: May 27, 2021
    Inventor: Shailaja Mallya
  • Publication number: 20190312912
    Abstract: Disclosed aspects relate to compliance configuration management for asset migration on a shared pool of configurable computing resources having a set of compute nodes. A migration request to migrate an asset coupled with a first compliance configuration from a source compute node to a target compute node may be detected. The first compliance configuration coupled with the asset on the source compute node may be compared with an expected compliance configuration for the target compute node. Based on and in response to the comparing, a mismatch of the first compliance configuration with respect to the expected compliance configuration may be determined. A set of response actions may be performed with respect to the migration request.
    Type: Application
    Filed: June 25, 2019
    Publication date: October 10, 2019
    Inventor: Shailaja Mallya
  • Publication number: 20190311137
    Abstract: Embodiments disclosed herein identify a first data asset that is associated with a non-optimized security configuration, based at least in part on metadata associated with the first data asset. Additionally, an optimized security configuration is generated for the first data asset by processing the metadata associated with the first data asset using one or more machine learning models. Furthermore, the optimized security configuration is applied to the first data asset.
    Type: Application
    Filed: April 9, 2018
    Publication date: October 10, 2019
    Inventors: Shailaja MALLYA, Nayna JAIN, Divya K. KONOOR, Pavitra MARAS
  • Patent number: 10375115
    Abstract: Disclosed aspects relate to compliance configuration management for asset migration on a shared pool of configurable computing resources having a set of compute nodes. A migration request to migrate an asset coupled with a first compliance configuration from a source compute node to a target compute node may be detected. The first compliance configuration coupled with the asset on the source compute node may be compared with an expected compliance configuration for the target compute node. Based on and in response to the comparing, a mismatch of the first compliance configuration with respect to the expected compliance configuration may be determined. A set of response actions may be performed with respect to the migration request.
    Type: Grant
    Filed: July 27, 2016
    Date of Patent: August 6, 2019
    Assignee: International Business Machines Corporation
    Inventor: Shailaja Mallya
  • Patent number: 10346327
    Abstract: A system and computer program product are provided for optimized timer placement. A request to apply a new timer in a computer system is received and an interrupt time for the new timer is extracted from the new timer. A timer list is accessed for each processor in the system responsive to the received request. A range for placement of the new timer is established with respect to each of the accessed timer lists. A timer expiry delay is calculated between proximal processor interrupts and the extracted interrupt time based on the established range placement. Proximity of the extracted interrupt time within the existing processor interrupts is determined and one of the processors is selected based on the calculation and the determined proximity. The new timer is placed on the selected processor.
    Type: Grant
    Filed: March 22, 2017
    Date of Patent: July 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Juan M. Casas, Jr., Nikhil Hegde, Keerthi B. Kumar, Shailaja Mallya
  • Patent number: 10346329
    Abstract: A method is provided for optimized timer placement. A request to apply a new timer in a computer system is received and an interrupt time for the new timer is extracted from the new timer. A timer list is accessed for each processor in the system responsive to the received request. A range for placement of the new timer is established with respect to each of the accessed timer lists. A timer expiry delay is calculated between proximal processor interrupts and the extracted interrupt time based on the established range placement. Proximity of the extracted interrupt time within the existing processor interrupts is determined and one of the processors is selected based on the calculation and the determined proximity. The new timer is placed on the selected processor.
    Type: Grant
    Filed: October 24, 2017
    Date of Patent: July 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Juan M. Casas, Jr., Nikhil Hegde, Keerthi B. Kumar, Shailaja Mallya
  • Patent number: 10256975
    Abstract: An embodiment of the invention may include a method, computer program product and system for data transfer. The embodiment may include receiving, by a relay node, a data payload from a data sending program intended for a data receiving program. The embodiment may include determining whether the received data payload is numeric data or non-numeric data based on a payload length associated with the received data payload. The embodiment may include creating a corrected data payload by performing at least one cognitive correction to the non-numeric data payload based on determining that the received data payload contains non-numeric data. The embodiment may include transmitting the corrected data payload.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: April 9, 2019
    Assignee: International Business Machines Corporation
    Inventor: Shailaja Mallya
  • Patent number: 10223146
    Abstract: Disclosed aspects relate to rearrangement management for a shared pool of configurable computing resources including a source asset, a target asset, and a memory device having a set of data. A first subset of the set of data on the memory device may be locked with respect to modification. A first set of logical address identifiers for the first subset of the set of data on the memory device may be identified in a hypervisor mapping table in a first set of source entries for the source asset. The first set of logical address identifiers for the first subset of the set of data on the memory device may be established in the hypervisor mapping table in a first set of target entries for the target asset. The first subset of the set of data on the memory device may be unlocked with respect to modification.
    Type: Grant
    Filed: July 26, 2016
    Date of Patent: March 5, 2019
    Assignee: International Business Machines Corporation
    Inventors: Amit Agarwal, Uma Maheswara R. Chandolu, Chetan L. Gaonkar, Shailaja Mallya
  • Publication number: 20180276156
    Abstract: A method is provided for optimized timer placement. A request to apply a new timer in a computer system is received and an interrupt time for the new timer is extracted from the new timer. A timer list is accessed for each processor in the system responsive to the received request. A range for placement of the new timer is established with respect to each of the accessed timer lists. A timer expiry delay is calculated between proximal processor interrupts and the extracted interrupt time based on the established range placement. Proximity of the extracted interrupt time within the existing processor interrupts is determined and one of the processors is selected based on the calculation and the determined proximity. The new timer is placed on the selected processor.
    Type: Application
    Filed: October 24, 2017
    Publication date: September 27, 2018
    Applicant: International Business Machines Corporation
    Inventors: Juan M. Casas, JR., Nikhil Hegde, Keerthi B. Kumar, Shailaja Mallya
  • Publication number: 20180276155
    Abstract: A system and computer program product are provided for optimized timer placement. A request to apply a new timer in a computer system is received and an interrupt time for the new timer is extracted from the new timer. A timer list is accessed for each processor in the system responsive to the received request. A range for placement of the new timer is established with respect to each of the accessed timer lists. A timer expiry delay is calculated between proximal processor interrupts and the extracted interrupt time based on the established range placement. Proximity of the extracted interrupt time within the existing processor interrupts is determined and one of the processors is selected based on the calculation and the determined proximity. The new timer is placed on the selected processor.
    Type: Application
    Filed: March 22, 2017
    Publication date: September 27, 2018
    Applicant: International Business Machines Corporation
    Inventors: Juan M. Casas, JR., Nikhil Hegde, Keerthi B. Kumar, Shailaja Mallya
  • Publication number: 20180248696
    Abstract: An embodiment of the invention may include a method, computer program product and system for data transfer. The embodiment may include receiving, by a relay node, a data payload from a data sending program intended for a data receiving program. The embodiment may include determining whether the received data payload is numeric data or non-numeric data based on a payload length associated with the received data payload. The embodiment may include creating a corrected data payload by performing at least one cognitive correction to the non-numeric data payload based on determining that the received data payload contains non-numeric data. The embodiment may include transmitting the corrected data payload.
    Type: Application
    Filed: February 28, 2017
    Publication date: August 30, 2018
    Inventor: Shailaja Mallya
  • Patent number: 9904473
    Abstract: A page type may be identified for each of a plurality of memory pages, the page type corresponding to a particular process that accesses a particular memory page of the plurality of memory pages. The plurality of memory pages may each respectively include duplicate data. The duplicate data may be a same set of data values. Each of the plurality of respective memory pages may be ranked as candidates to deduplicate the set of data values to. The ranking may be based on at least the page type. In response to identifying the first processor and identifying a first memory device, the duplicate data may be deduplicated from the plurality of memory pages to a highest ranked memory page. The deduplication may correspond to coalescing the duplicate data to the highest ranked memory page.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: February 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Keerthi B. Kumar, Shailaja Mallya
  • Publication number: 20180032360
    Abstract: Disclosed aspects relate to rearrangement management for a shared pool of configurable computing resources including a source asset, a target asset, and a memory device having a set of data. A first subset of the set of data on the memory device may be locked with respect to modification. A first set of logical address identifiers for the first subset of the set of data on the memory device may be identified in a hypervisor mapping table in a first set of source entries for the source asset. The first set of logical address identifiers for the first subset of the set of data on the memory device may be established in the hypervisor mapping table in a first set of target entries for the target asset. The first subset of the set of data on the memory device may be unlocked with respect to modification.
    Type: Application
    Filed: July 26, 2016
    Publication date: February 1, 2018
    Inventors: Amit Agarwal, Uma Maheswara R. Chandolu, Chetan L. Gaonkar, Shailaja Mallya
  • Publication number: 20180034856
    Abstract: Disclosed aspects relate to compliance configuration management for asset migration on a shared pool of configurable computing resources having a set of compute nodes. A migration request to migrate an asset coupled with a first compliance configuration from a source compute node to a target compute node may be detected. The first compliance configuration coupled with the asset on the source compute node may be compared with an expected compliance configuration for the target compute node. Based on and in response to the comparing, a mismatch of the first compliance configuration with respect to the expected compliance configuration may be determined. A set of response actions may be performed with respect to the migration request.
    Type: Application
    Filed: July 27, 2016
    Publication date: February 1, 2018
    Inventor: Shailaja Mallya