Patents by Inventor Srikanth Mandava

Srikanth Mandava has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200127854
    Abstract: An embodiment of a system is disclosed in which a monitoring computer system may store instrumentation program code, and then copy the instrumentation program code into a server computer system without modifying a communication application module stored in the server computer system. The instrumentation program code, when executed, may causes the server computer system to perform operations including, for example, intercepting a message sent by a client computer system to the communication application module, and detecting a digital certificate included in the message. The instrumentation program code may further cause the server computer system to perform operations such as determining an expiration time of the digital certificate, and initiating a renewal of the digital certificate.
    Type: Application
    Filed: October 18, 2018
    Publication date: April 23, 2020
    Inventor: Srikanth Mandava
  • Publication number: 20180075412
    Abstract: Based on creation or assignment of a first artifact for a collaborative product development in an enterprise, identifying first text in the first artifact is identified. For each of a plurality of stored artifacts of the enterprise, a determination is made of whether the stored artifact includes a second text that matches the first text identified in the first artifact to a degree that satisfies a matching threshold. In response to determining satisfaction of the matching threshold, a determination is made of whether the first artifact satisfies a collaboration criterion that is based, at least in part, on an attribute of at least one of the first artifact and the stored artifact. In response to determining that the collaboration criterion is satisfied, a collaboration notification regarding the stored artifact is transmitted.
    Type: Application
    Filed: September 12, 2016
    Publication date: March 15, 2018
    Inventor: Srikanth Mandava
  • Patent number: 9760725
    Abstract: Some embodiments provide one or more of systems, methods, software, and data structures to control locations where files may be stored. Some such embodiments include receiving a request to perform a file management function affecting a location where a first file is stored and querying a repository of file management rules as a function of at least one of a file type of the first file, a location where the first file is stored, a destination of where the first file is to be stored, and an identity of a user to retrieve a first set of file management rules. These embodiments further include determining if the destination is an authorized location where the first file may be stored as a function of the first set of retrieved file management rules and preventing the file management function when the determining identifies that the destination is not an authorized location.
    Type: Grant
    Filed: June 11, 2008
    Date of Patent: September 12, 2017
    Assignee: CA, Inc.
    Inventor: Srikanth Mandava
  • Patent number: 9684534
    Abstract: Data is collected for at least one metric relating to utilization of a computing resource allocated to a virtual machine. The data is compared to decision criteria. A confidence level that the virtual machine is not utilized based, at least in part, on the comparing is determined. A policy is identified that defines an action to be taken for the confidence level. A severity of the action is greater as the confidence level increases. The action is initiated the action in accordance with the policy and confidence level.
    Type: Grant
    Filed: February 11, 2016
    Date of Patent: June 20, 2017
    Assignee: CA, Inc.
    Inventors: Srikanth Mandava, Frank Branciforti, James Willing, Julio Quintana, Christine Lyons
  • Patent number: 9483247
    Abstract: Various embodiments illustrated and described herein schedule a software upgrade as part of normal workload assignment and management. In one embodiment, a workload automation system evaluates the projected workload on a system affected by a software upgrade. Policies may determine requirements that should be met during the software upgrade, such as jobs that may or may not be postponed, preferred times of software upgrade, etc. The software upgrade may also have constraints associated with it, such as a time by which the upgrade must be completed, the order of upgrade if multiple systems are involved, etc. These constraints may be part of the policies or may be separate. Based on forecasted workload automation, policies, and any other constraints a time slot for software upgrade is selected and the upgrade is scheduled for the time slot as part of a work queue.
    Type: Grant
    Filed: January 27, 2014
    Date of Patent: November 1, 2016
    Assignee: CA, Inc.
    Inventor: Srikanth Mandava
  • Publication number: 20160162323
    Abstract: Data is collected for at least one metric relating to utilization of a computing resource allocated to a virtual machine. The data is compared to decision criteria. A confidence level that the virtual machine is not utilized based, at least in part, on the comparing is determined. A policy is identified that defines an action to be taken for the confidence level. A severity of the action is greater as the confidence level increases. The action is initiated the action in accordance with the policy and confidence level.
    Type: Application
    Filed: February 11, 2016
    Publication date: June 9, 2016
    Inventors: Srikanth Mandava, Frank Branciforti, James Willing, Julio Quintana, Christine Lyons
  • Patent number: 9298492
    Abstract: Various embodiments illustrated and described herein include systems, methods, and computer program products to modify virtual machine resources. Some embodiments collect a wide variety of metrics and then analyze the metrics to determine whether a virtual machine is not being utilized. This determination may include an associated confidence level. When the confidence level reaches a designated threshold, action may be initiated. Such actions can include notifying users of the virtual machine and/or a user's supervisor that the virtual machine is not being utilized and that further action will be taken at a designated time. Further actions can include such things as archiving the virtual machine, reducing the resources allocated to the virtual machine, archiving user data, and deleting the virtual machine.
    Type: Grant
    Filed: March 5, 2014
    Date of Patent: March 29, 2016
    Assignee: CA, Inc.
    Inventors: Srikanth Mandava, Frank Branciforti, James Willing, Julio Quintana, Christine Lyons
  • Publication number: 20150254090
    Abstract: Various embodiments illustrated and described herein include systems, methods, and computer program products to modify virtual machine resources. Some embodiments collect a wide variety of metrics and then analyze the metrics to determine whether a virtual machine is not being utilized. This determination may include an associated confidence level. When the confidence level reaches a designated threshold, action may be initiated. Such actions can include notifying users of the virtual machine and/or a user's supervisor that the virtual machine is not being utilized and that further action will be taken at a designated time. Further actions can include such thins as archiving the virtual machine, reducing the resources allocated to the virtual machine, archiving user data, and deleting the virtual machine.
    Type: Application
    Filed: March 5, 2014
    Publication date: September 10, 2015
    Applicant: CA, Inc.
    Inventors: Srikanth Mandava, Frank Branciforti, James Willing, Julio Quintana, Christine Lyons
  • Publication number: 20150212808
    Abstract: Various embodiments illustrated and described herein schedule a software upgrade as part of normal workload assignment and management. In one embodiment, a workload automation system evaluates the projected workload on a system affected by a software upgrade. Policies may determine requirements that should be met during the software upgrade, such as jobs that may or may not be postponed, preferred times of software upgrade, etc. The software upgrade may also have constraints associated with it, such as a time by which the upgrade must be completed, the order of upgrade if multiple systems are involved, etc. These constraints may be part of the policies or may be separate. Based on forecasted workload automation, policies, and any other constraints a time slot for software upgrade is selected and the upgrade is scheduled for the time slot as part of a work queue.
    Type: Application
    Filed: January 27, 2014
    Publication date: July 30, 2015
    Applicant: CA, Inc.
    Inventor: Srikanth Mandava
  • Patent number: 8918901
    Abstract: A system and method for restricting access to requested data based on user location are disclosed. The method comprises receiving a data request and determining origin location information of the data request from a source providing information having accuracy to a predetermined standard. The method further comprises retrieving one or more policies associated with the requested data, comparing the origin location information with the policies, and dynamically adjusting access restrictions to the requested data based on the comparison.
    Type: Grant
    Filed: February 4, 2010
    Date of Patent: December 23, 2014
    Assignee: CA, Inc.
    Inventors: Srikanth Mandava, Steven L. Greenspan
  • Patent number: 8819858
    Abstract: Various embodiments described and illustrated here include one or more of systems, methods, software, and data structures that may be used to implement policies for hardware access and monitoring control in concert with a premises security system that controls ingress and egress of a facility. One embodiment includes identifying when certain devices are removed or decoupled from a computer and preventing one or more users of that computer from leaving a facility within which the computer is located.
    Type: Grant
    Filed: December 19, 2012
    Date of Patent: August 26, 2014
    Assignee: CA, Inc.
    Inventor: Srikanth Mandava
  • Patent number: 8341729
    Abstract: Various embodiments described and illustrated here include one or more of systems, methods, software, and data structures that may be used to implement policies for hardware access and monitoring control. One embodiment includes obtaining device property data from each device coupled to a system and determining if each device is a device authorized for use with the system. Such embodiments may further include allowing only devices authorized for use with the system to be accessed by processes of the system.
    Type: Grant
    Filed: June 3, 2008
    Date of Patent: December 25, 2012
    Assignee: CA, Inc.
    Inventor: Srikanth Mandava
  • Publication number: 20110191862
    Abstract: A system and method for restricting access to requested data based on user location are disclosed. The method comprises receiving a data request and determining origin location information of the data request from a source providing information having accuracy to a predetermined standard. The method further comprises retrieving one or more policies associated with the requested data, comparing the origin location information with the policies, and dynamically adjusting access restrictions to the requested data based on the comparison.
    Type: Application
    Filed: February 4, 2010
    Publication date: August 4, 2011
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Srikanth Mandava, Steven L. Greenspan
  • Publication number: 20100306019
    Abstract: A computerized process includes using a processor to receive data associated with a mobile location device such as a mobile phone. The data permits a determination of a location of the mobile location device. The data is used to determine if a person associated with the mobile location device is away from a particular location such as a place of business. If so, the processor automatically assigns a task of the person associated with the mobile phone to a second person. In another embodiment, the processor automatically transmits an alert to a second person as a function of the location of the mobile location device.
    Type: Application
    Filed: June 2, 2009
    Publication date: December 2, 2010
    Applicant: Computer Associates Think, Inc.
    Inventor: Srikanth Mandava
  • Publication number: 20090313702
    Abstract: Some embodiments provide one or more of systems, methods, software, and data structures to control locations where files may be stored. Some such embodiments include receiving a request to perform a file management function affecting a location where a first file is stored and querying a repository of file management rules as a function of at least one of a file type of the first file, a location where the first file is stored, a destination of where the first file is to be stored, and an identity of a user to retrieve a first set of file management rules. These embodiments further include determining if the destination is an authorized location where the first file may be stored as a function of the first set of retrieved file management rules and preventing the file management function when the determining identifies that the destination is not an authorized location.
    Type: Application
    Filed: June 11, 2008
    Publication date: December 17, 2009
    Applicant: CA. Inc.
    Inventor: Srikanth Mandava
  • Publication number: 20090300717
    Abstract: Various embodiments described and illustrated here include one or more of systems, methods, software, and data structures that may be used to implement policies for hardware access and monitoring control. One embodiment includes obtaining device property data from each device coupled to a system and determining if each device is a device authorized for use with the system. Such embodiments may further include allowing only devices authorized for use with the system to be accessed by processes of the system.
    Type: Application
    Filed: June 3, 2008
    Publication date: December 3, 2009
    Applicant: CA, Inc.
    Inventor: Srikanth Mandava