Patents Assigned to Infosys Technologies Ltd.
  • Publication number: 20090300061
    Abstract: A system and method for automatically generating the universe from the documented MS-Excel file is disclosed. The methods for the Generate Universe, Migrate Universe, Update Universe and Document Universe are disclosed. The method helps in reduction of build effort of the project and removes the problem of corruption of the universe file of link being lost. The method provides easy maintenance of the universe versions and multi-user development environments and updating of universe files.
    Type: Application
    Filed: December 3, 2008
    Publication date: December 3, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: Bhanu Prashanthi Murthy, Farhana Khan
  • Publication number: 20090287609
    Abstract: A method and system for managing projects on a network platform that enables a buyer to make a buy request for a project on a network platform. The buy request includes various requirements of the project. In response to the buy request, various sellers provide submissions for the project on the network platform. The submissions may be utilized by the buyer of the project. Various sellers can provide the submissions that comply with one or more requirements of the project. The buyer utilizes the submissions to execute the project, based on their compliance with the requirements of the project, and provides compensation to the sellers.
    Type: Application
    Filed: December 11, 2008
    Publication date: November 19, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: Vivek Sharma, Varun Sharma
  • Publication number: 20090282418
    Abstract: A method for scheduling a plurality of computation jobs to a plurality of data processing units (DPUs) in a grid computing system 100. The method includes receiving a first computation job by a scheduling DPU from the plurality of computation jobs. Further, the method includes scheduling the first computation job at a first set of DPUs in the grid computing system based on first scheduling criteria. Furthermore, the method includes scheduling the first computation job at a first DPU from the first set of DPUs based on second scheduling criteria. The method also includes storing information about the first computation job and the first set of DPUs in a history table at the scheduling DPU. The method further includes storing information about the first DPU in a demand matrix of the first set of DPUs.
    Type: Application
    Filed: December 8, 2008
    Publication date: November 12, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: Shubhashis Sengupta, Anirban Chakrabarti, Lopamudra Chakrabarti
  • Publication number: 20090276263
    Abstract: A method to shape one or more features of Web 2.0 in the form of Web 2.0 solutions, using Web 2.0 realization framework, to the plurality of enterprises is disclosed. The method includes identifying the respective enterprises computing infrastructure and a business application needs of the respective enterprises. The respective enterprises current support system is also measured to find the feasibility of implementing the features of the Web 2.0. The method further comprises offering one or more Web 2.0 features to the respective enterprises based on the business activity. The method includes providing the Web Realization Cycle (WRC) for controlled implementation of Web 2.0 features to the respective enterprises.
    Type: Application
    Filed: November 25, 2008
    Publication date: November 5, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: Brijesh Deb, Ruchali Dodderi, Freddi Gyara, Sreekumar Paramu
  • Publication number: 20090254876
    Abstract: Software system facts comprising concepts, concept instances and relationships within the software system are identified and stored in a repository. The software system facts are extracted from artifacts comprising the software system or are provided through explicit definition. Architectures of the software system are recovered from the stored software system facts. Layered views of the recovered architectures are generated. The stored software system facts are checked against architectural rules to ensure architectural compliance of the software system. The impact of proposed changes to the software system is assessed by querying the identified software system facts.
    Type: Application
    Filed: September 19, 2008
    Publication date: October 8, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: John Kuriakose, Yogesh Sudhir Dandawate
  • Publication number: 20090254877
    Abstract: Software system facts comprising concepts, concept instances and relationships within the software system are identified and stored in a repository. The software system facts are extracted from artifacts comprising the software system or are provided through explicit definition. Architectures of the software system are recovered from the stored software system facts. Layered views of the recovered architectures are generated. The stored software system facts are checked against architectural rules to ensure architectural compliance of the software system. The impact of proposed changes to the software system is assessed by querying the identified software system facts.
    Type: Application
    Filed: September 19, 2008
    Publication date: October 8, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: John Kuriakose, Yogesh Sudhir Dandawate, Manish Malhotra, Kumar Manava Tiwari
  • Publication number: 20090254884
    Abstract: Topics in source code can be identified using Latent Dirichlet Allocation (LDA) by receiving source code, identifying domain specific keywords from the source code, generating a keyword matrix, processing the keyword matrix and the source code using LDA, and outputting a list of topics. The list of topics is output as collections of domain specific keywords. Probabilities of domain specific keywords belonging to their respective topics can also be output. The keyword matrix comprises weighted sums of occurrences of domain specific keywords in the source code.
    Type: Application
    Filed: September 17, 2008
    Publication date: October 8, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: Girish Maskeri Rama, Kenneth Heafield, Santonu Sarkar
  • Publication number: 20090254916
    Abstract: Computing resources can be assigned to sub-plans within a query plan to effect parallel execution of the query plan. For example, computing resources in a grid can be represented by nodes, and a shortest path technique can be applied to allocate machines to the sub-plans. Computing resources can be provisionally allocated as the query plan is divided into query plan segments containing one or more sub-plans. Based on provisional allocations to the segments, the computing resources can then be allocated to the sub-plans within respective segments. Multiprocessor computing resources can be supported. The techniques can account for data locality. Both pipelined and partitioned parallelism can be addressed. Described techniques can be particularly suited for efficient execution of bushy query plans in a grid environment. Parallel processing will reduce the overall response time of the query.
    Type: Application
    Filed: August 14, 2008
    Publication date: October 8, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: Sumit Kumar Bose, Srikumar Krishnamoorthy, Nilesh Dilip Ranade
  • Publication number: 20090183137
    Abstract: A framework for securing a source code base during the development phase of a software development lifecycle is provided. The framework includes an aspect package module and a validator package module. The aspect package module integrates security routines into the source code base. The aspect package module includes a custom interface module and a validator aspect module. The custom interface module includes a function declaration, wherein the custom interface module is implemented by at least one class of the one or more classes. The validator aspect module includes a controller code for controlling the flow of the execution, based on the context for the security validation of the at least one class, wherein one or more security routine integration points are defined in the at least one class. The validator package module validates the at least one class, based on the defined context, by using one or more validation classes.
    Type: Application
    Filed: December 23, 2008
    Publication date: July 16, 2009
    Applicant: Infosys Technologies Ltd.
    Inventor: Maneesh Kumar Ponnath
  • Publication number: 20090182730
    Abstract: A method of storing semantically similar documents on proximally located peers in a structured peer to peer overlay network, where each peer is assigned a unique identifier and each document includes one or more words belonging to at least one hierarchical structured collection of words. A method of searching and retrieving documents, corresponding to a search query, from a structured peer to peer overlay network is also provided.
    Type: Application
    Filed: March 6, 2008
    Publication date: July 16, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: Srikumar Krishnamoorthy, Abdul Sakib Mondal
  • Publication number: 20090147937
    Abstract: A system and method for providing personalized call treatment to an incoming call by using a combination of data and communication services is provided. The system comprises a Mashup application for determining a treatment method corresponding to each incoming call based on a called person's profile and one or more predefined rules. The system also comprises a communication services platform and a data services platform coupled with the Mashup application.
    Type: Application
    Filed: October 22, 2008
    Publication date: June 11, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: Neeraj Sullhan, Ripan Kumar, Taranjit Singh
  • Publication number: 20090150325
    Abstract: A system, method and computer program product for the root cause analysis of the failure of a manufactured product is disclosed. The present invention includes the development of a knowledge model, based on information obtained from historical warranty claim forms and various manufacturing data sources. The invention also includes processing text information in a free-form text that is obtained from warranty claim forms by using text-tagging and annotation techniques. Thereafter, the knowledge model is converted to a Bayesian network. The present invention provides a user interface to select parameters and corresponding instances from current warranty claim forms. The selected parameters and corresponding instances are used as input evidence for the Bayesian network. The present invention facilitates the process of drawing inferences for root cause analysis of the failure of manufactured products and corresponding probabilities.
    Type: Application
    Filed: December 3, 2008
    Publication date: June 11, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: Sudripto De, Srinivas Narasimhamurthy, Ashish Sureka, Satyabrata Pradhan
  • Patent number: 7546222
    Abstract: A system adapted for analyzing performance and scalability of at least one computer system is disclosed. The system include a monitoring module configured for capturing at least one metric of an application for analyzing performance and scalability and a performance knowledge repository created and represented by using the at least one metric captured by the monitoring module. The system further includes a diagnosis module adapted for mapping the at least one metric to the performance knowledge repository using a diagnosis module and an analysis module configured for conducting performance and scalability analysis based on the mapping of the at least one metric for detecting at least one undesirable condition.
    Type: Grant
    Filed: December 5, 2006
    Date of Patent: June 9, 2009
    Assignee: Infosys Technologies, Ltd.
    Inventors: Ramkumar N. Chintalapti, Rajeshwari Ganesan, Sachin Ashok Wagh
  • Publication number: 20090144125
    Abstract: A system, method and computer program product for providing a procurement solution, including determining a maturity level of a strategic direction, procurement processes, and procurement information technology (IT) landscape of a client; identifying a prescription to a spend management solution product, based on the determined maturity level, procurement processes, and procurement IT landscape of the client; and deploying the spend management solution product for the client based on the identified prescription to the spend management solution product.
    Type: Application
    Filed: December 4, 2007
    Publication date: June 4, 2009
    Applicant: Infosys Technologies, Ltd.
    Inventors: Satadal Bandyopadhyay, Amit Tambi, Sharad Kulshrestha, Sumit Patnaik, Lakshmi Raghava Dhenuvakonda, Gopikrishnan Gouri Ramachandran
  • Publication number: 20090133002
    Abstract: A method to create web 2.0 index for an online business environment includes listing web 2.0 parameters, assigning a value based score to the listed web 2.0 parameters against each online business environment and computing the web 2.0 index for each online business environment. The method can create a benchmark between online business environments based on indicative of the computed web 2.0 indices. The web 2.0 index for an online business environment is the calculated by aggregating the value based scores assigned to individual web 2.0 parameters. The list of web 2.0 parameters for an online business environment captures content index constituents, collaboration index constituents and commerce index constituents.
    Type: Application
    Filed: November 6, 2008
    Publication date: May 21, 2009
    Applicant: Infosys Technologies Ltd.
    Inventor: Jai Ganesh
  • Publication number: 20090133103
    Abstract: A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is disclosed. The method and system includes sending request by at least one user to access at least one application server. The user is provisioned to download a appropriate CMSC and a mapper into the user equipment from the application server. The method and system further comprises user sending request via an IMS network to download a data to the user equipment. The data is encrypted in the application server and is downloaded into the user equipment. The mapper identifies the appropriate CMSC, which may decrypt the data. Further, the data undergoes double decryption in real time within the user equipment before being presented in user interface. The double decryption is provisioned using the valid CMSC downloaded in the user equipment.
    Type: Application
    Filed: October 27, 2008
    Publication date: May 21, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: Jithesh Sathyan, Naveen Krishnan Unni
  • Publication number: 20090106037
    Abstract: An electronic book locator can be a hand-held or a mounted device for locating or cataloguing books. One or more images of book spines can be processed using character recognition methods to electronically recognize book identification information appearing on the book spine. Locations of books in a book storage area can be determined from images of the books in the book storage area. Determined book locations can be compared to designated locations and misplaced books can be indicated. A book database can be generated based on images of books. Identification information of a target book can be input into a book locator device and a location of the target book can be indicated by the device.
    Type: Application
    Filed: December 5, 2007
    Publication date: April 23, 2009
    Applicant: Infosys Technologies Ltd.
    Inventor: Rajmohan Harindranath
  • Publication number: 20090100404
    Abstract: Implementation size of a software package implementation can be determined by determining implementation sizes of modules, determining tasks to be implemented, determining a complexity factor, and calculating the implementation size based on the modules, tasks, and complexity factor. Implementation size of a software package implementation can be determined using a sizing framework. The sizing framework can comprise a repository of modules and functionality provided by the modules, a standard album of tasks, effort information for the tasks, and a repository of complexity values. A sizing tool can determine an implementation size of a software package implementation. The sizing tool can comprise user-interface pages for receiving a selection of modules, for receiving a selection of functionality, for receiving a selection of tasks to be implemented for the software package, and for receiving a selection of complexity values. The sizing tool can calculate the implementation size based on the selections.
    Type: Application
    Filed: October 12, 2007
    Publication date: April 16, 2009
    Applicant: Infosys Technologies, Ltd.
    Inventors: Atul Chaturvedi, Rajeev Ranjan, RamPrasad Vadde
  • Publication number: 20090083325
    Abstract: A method, system and computer program product for testing a Middleware based application, including providing XML or XSD data and generating an XML template from the XML or XSD data, generating a test data template from the XML template, and generating XML values from the test data template. The XML values may be published over a Middleware based application. A query may be built in a application database wherein the data base is in communication with the Middleware based application. The queries may be executed by fetching data from the database. The method, system and computer program product may further include validating test data and subscribing to an application output. After validating the subscribed output against an expected output, a test result may be generated.
    Type: Application
    Filed: September 24, 2007
    Publication date: March 26, 2009
    Applicant: INFOSYS TECHNOLOGIES, LTD.
    Inventors: Vasu BELIDE, Raja George KAVALAM
  • Publication number: 20090030761
    Abstract: The financial impact of the implementation of a business framework can be predicted. Shifted business condition metrics associated with business activities for implementing the business framework can be applied to model financial impact for a business entity. Impact on financial condition according to income statement and balance sheet can be modeled based on financial data for the business entity. Impact can be modeled per activity. Activities can be prioritized based on modeled impact.
    Type: Application
    Filed: July 9, 2008
    Publication date: January 29, 2009
    Applicant: Infosys Technologies Ltd.
    Inventors: Kannan Amaresh, Vinayak Arun Kini, Sumanta Deb