Patents by Inventor Srikanth Mandava
Srikanth Mandava has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200127854Abstract: An embodiment of a system is disclosed in which a monitoring computer system may store instrumentation program code, and then copy the instrumentation program code into a server computer system without modifying a communication application module stored in the server computer system. The instrumentation program code, when executed, may causes the server computer system to perform operations including, for example, intercepting a message sent by a client computer system to the communication application module, and detecting a digital certificate included in the message. The instrumentation program code may further cause the server computer system to perform operations such as determining an expiration time of the digital certificate, and initiating a renewal of the digital certificate.Type: ApplicationFiled: October 18, 2018Publication date: April 23, 2020Inventor: Srikanth Mandava
-
Publication number: 20180075412Abstract: Based on creation or assignment of a first artifact for a collaborative product development in an enterprise, identifying first text in the first artifact is identified. For each of a plurality of stored artifacts of the enterprise, a determination is made of whether the stored artifact includes a second text that matches the first text identified in the first artifact to a degree that satisfies a matching threshold. In response to determining satisfaction of the matching threshold, a determination is made of whether the first artifact satisfies a collaboration criterion that is based, at least in part, on an attribute of at least one of the first artifact and the stored artifact. In response to determining that the collaboration criterion is satisfied, a collaboration notification regarding the stored artifact is transmitted.Type: ApplicationFiled: September 12, 2016Publication date: March 15, 2018Inventor: Srikanth Mandava
-
Patent number: 9760725Abstract: Some embodiments provide one or more of systems, methods, software, and data structures to control locations where files may be stored. Some such embodiments include receiving a request to perform a file management function affecting a location where a first file is stored and querying a repository of file management rules as a function of at least one of a file type of the first file, a location where the first file is stored, a destination of where the first file is to be stored, and an identity of a user to retrieve a first set of file management rules. These embodiments further include determining if the destination is an authorized location where the first file may be stored as a function of the first set of retrieved file management rules and preventing the file management function when the determining identifies that the destination is not an authorized location.Type: GrantFiled: June 11, 2008Date of Patent: September 12, 2017Assignee: CA, Inc.Inventor: Srikanth Mandava
-
Patent number: 9684534Abstract: Data is collected for at least one metric relating to utilization of a computing resource allocated to a virtual machine. The data is compared to decision criteria. A confidence level that the virtual machine is not utilized based, at least in part, on the comparing is determined. A policy is identified that defines an action to be taken for the confidence level. A severity of the action is greater as the confidence level increases. The action is initiated the action in accordance with the policy and confidence level.Type: GrantFiled: February 11, 2016Date of Patent: June 20, 2017Assignee: CA, Inc.Inventors: Srikanth Mandava, Frank Branciforti, James Willing, Julio Quintana, Christine Lyons
-
Patent number: 9483247Abstract: Various embodiments illustrated and described herein schedule a software upgrade as part of normal workload assignment and management. In one embodiment, a workload automation system evaluates the projected workload on a system affected by a software upgrade. Policies may determine requirements that should be met during the software upgrade, such as jobs that may or may not be postponed, preferred times of software upgrade, etc. The software upgrade may also have constraints associated with it, such as a time by which the upgrade must be completed, the order of upgrade if multiple systems are involved, etc. These constraints may be part of the policies or may be separate. Based on forecasted workload automation, policies, and any other constraints a time slot for software upgrade is selected and the upgrade is scheduled for the time slot as part of a work queue.Type: GrantFiled: January 27, 2014Date of Patent: November 1, 2016Assignee: CA, Inc.Inventor: Srikanth Mandava
-
Publication number: 20160162323Abstract: Data is collected for at least one metric relating to utilization of a computing resource allocated to a virtual machine. The data is compared to decision criteria. A confidence level that the virtual machine is not utilized based, at least in part, on the comparing is determined. A policy is identified that defines an action to be taken for the confidence level. A severity of the action is greater as the confidence level increases. The action is initiated the action in accordance with the policy and confidence level.Type: ApplicationFiled: February 11, 2016Publication date: June 9, 2016Inventors: Srikanth Mandava, Frank Branciforti, James Willing, Julio Quintana, Christine Lyons
-
Patent number: 9298492Abstract: Various embodiments illustrated and described herein include systems, methods, and computer program products to modify virtual machine resources. Some embodiments collect a wide variety of metrics and then analyze the metrics to determine whether a virtual machine is not being utilized. This determination may include an associated confidence level. When the confidence level reaches a designated threshold, action may be initiated. Such actions can include notifying users of the virtual machine and/or a user's supervisor that the virtual machine is not being utilized and that further action will be taken at a designated time. Further actions can include such things as archiving the virtual machine, reducing the resources allocated to the virtual machine, archiving user data, and deleting the virtual machine.Type: GrantFiled: March 5, 2014Date of Patent: March 29, 2016Assignee: CA, Inc.Inventors: Srikanth Mandava, Frank Branciforti, James Willing, Julio Quintana, Christine Lyons
-
Publication number: 20150254090Abstract: Various embodiments illustrated and described herein include systems, methods, and computer program products to modify virtual machine resources. Some embodiments collect a wide variety of metrics and then analyze the metrics to determine whether a virtual machine is not being utilized. This determination may include an associated confidence level. When the confidence level reaches a designated threshold, action may be initiated. Such actions can include notifying users of the virtual machine and/or a user's supervisor that the virtual machine is not being utilized and that further action will be taken at a designated time. Further actions can include such thins as archiving the virtual machine, reducing the resources allocated to the virtual machine, archiving user data, and deleting the virtual machine.Type: ApplicationFiled: March 5, 2014Publication date: September 10, 2015Applicant: CA, Inc.Inventors: Srikanth Mandava, Frank Branciforti, James Willing, Julio Quintana, Christine Lyons
-
Publication number: 20150212808Abstract: Various embodiments illustrated and described herein schedule a software upgrade as part of normal workload assignment and management. In one embodiment, a workload automation system evaluates the projected workload on a system affected by a software upgrade. Policies may determine requirements that should be met during the software upgrade, such as jobs that may or may not be postponed, preferred times of software upgrade, etc. The software upgrade may also have constraints associated with it, such as a time by which the upgrade must be completed, the order of upgrade if multiple systems are involved, etc. These constraints may be part of the policies or may be separate. Based on forecasted workload automation, policies, and any other constraints a time slot for software upgrade is selected and the upgrade is scheduled for the time slot as part of a work queue.Type: ApplicationFiled: January 27, 2014Publication date: July 30, 2015Applicant: CA, Inc.Inventor: Srikanth Mandava
-
Patent number: 8918901Abstract: A system and method for restricting access to requested data based on user location are disclosed. The method comprises receiving a data request and determining origin location information of the data request from a source providing information having accuracy to a predetermined standard. The method further comprises retrieving one or more policies associated with the requested data, comparing the origin location information with the policies, and dynamically adjusting access restrictions to the requested data based on the comparison.Type: GrantFiled: February 4, 2010Date of Patent: December 23, 2014Assignee: CA, Inc.Inventors: Srikanth Mandava, Steven L. Greenspan
-
Patent number: 8819858Abstract: Various embodiments described and illustrated here include one or more of systems, methods, software, and data structures that may be used to implement policies for hardware access and monitoring control in concert with a premises security system that controls ingress and egress of a facility. One embodiment includes identifying when certain devices are removed or decoupled from a computer and preventing one or more users of that computer from leaving a facility within which the computer is located.Type: GrantFiled: December 19, 2012Date of Patent: August 26, 2014Assignee: CA, Inc.Inventor: Srikanth Mandava
-
Patent number: 8341729Abstract: Various embodiments described and illustrated here include one or more of systems, methods, software, and data structures that may be used to implement policies for hardware access and monitoring control. One embodiment includes obtaining device property data from each device coupled to a system and determining if each device is a device authorized for use with the system. Such embodiments may further include allowing only devices authorized for use with the system to be accessed by processes of the system.Type: GrantFiled: June 3, 2008Date of Patent: December 25, 2012Assignee: CA, Inc.Inventor: Srikanth Mandava
-
Publication number: 20110191862Abstract: A system and method for restricting access to requested data based on user location are disclosed. The method comprises receiving a data request and determining origin location information of the data request from a source providing information having accuracy to a predetermined standard. The method further comprises retrieving one or more policies associated with the requested data, comparing the origin location information with the policies, and dynamically adjusting access restrictions to the requested data based on the comparison.Type: ApplicationFiled: February 4, 2010Publication date: August 4, 2011Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Srikanth Mandava, Steven L. Greenspan
-
Publication number: 20100306019Abstract: A computerized process includes using a processor to receive data associated with a mobile location device such as a mobile phone. The data permits a determination of a location of the mobile location device. The data is used to determine if a person associated with the mobile location device is away from a particular location such as a place of business. If so, the processor automatically assigns a task of the person associated with the mobile phone to a second person. In another embodiment, the processor automatically transmits an alert to a second person as a function of the location of the mobile location device.Type: ApplicationFiled: June 2, 2009Publication date: December 2, 2010Applicant: Computer Associates Think, Inc.Inventor: Srikanth Mandava
-
Publication number: 20090313702Abstract: Some embodiments provide one or more of systems, methods, software, and data structures to control locations where files may be stored. Some such embodiments include receiving a request to perform a file management function affecting a location where a first file is stored and querying a repository of file management rules as a function of at least one of a file type of the first file, a location where the first file is stored, a destination of where the first file is to be stored, and an identity of a user to retrieve a first set of file management rules. These embodiments further include determining if the destination is an authorized location where the first file may be stored as a function of the first set of retrieved file management rules and preventing the file management function when the determining identifies that the destination is not an authorized location.Type: ApplicationFiled: June 11, 2008Publication date: December 17, 2009Applicant: CA. Inc.Inventor: Srikanth Mandava
-
Publication number: 20090300717Abstract: Various embodiments described and illustrated here include one or more of systems, methods, software, and data structures that may be used to implement policies for hardware access and monitoring control. One embodiment includes obtaining device property data from each device coupled to a system and determining if each device is a device authorized for use with the system. Such embodiments may further include allowing only devices authorized for use with the system to be accessed by processes of the system.Type: ApplicationFiled: June 3, 2008Publication date: December 3, 2009Applicant: CA, Inc.Inventor: Srikanth Mandava