Patents by Inventor Abhishek Gupta

Abhishek Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11615239
    Abstract: The present disclosure relates to systems for identifying instances of natural language input, determining intent classifications associated with instances of natural language input, and generating responses based on the determined intent classifications. In particular, the disclosed systems intelligently identify and group instances of natural language input based on characteristics of the user input. Additionally, the disclosed systems determine intent classifications for the instances of natural language input based message queuing in order to delay responses to the user input in ways that increase accuracy of the responses, while retaining a conversational aspect of the ongoing chat. Moreover, in one or more embodiments, the disclosed systems generate responses utilizing natural language.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: March 28, 2023
    Assignee: Adobe Inc.
    Inventors: Oliver Brdiczka, Ajinkya Kale, Piyush Chandra, Tracy King, Abhishek Gupta, Sourabh Goel, Nitin Garg, Deepika Naryani, Feroz Ahmad, Vikas Sagar
  • Publication number: 20230080691
    Abstract: A reference snapshot selection technique is configured to select a reference snapshot resolution algorithm used to determine an appropriate reference snapshot that may be employed to perform incremental snapshot replication of workload data between primary and secondary sites in a data replication environment. A reference resolution procedure is configured to process a set of constraints from the data replication environment to dynamically select the reference snapshot resolution algorithm based on a figure of merit that satisfies administrative constraints to reduce or optimize resource utilization in the data replication environment.
    Type: Application
    Filed: October 27, 2021
    Publication date: March 16, 2023
    Inventors: Abhishek Gupta, Brajesh Kumar Shrivastava, Pranab Patnaik
  • Publication number: 20230079621
    Abstract: A technique improves storage efficiency of an object store configured to maintain numerous snapshots for long-term storage in an archival storage system by efficiently determining data that is exclusively owned by an expiring snapshot to allow deletion of the expiring snapshot from the object store. The technique involves managing index data structures to enable efficient garbage collection across a very large number of data objects. When a snapshot expires, the technique obviates the need to scan the numerous snapshot data objects to determine which index structures are no longer needed and can be reclaimed (garbage collected). The technique is directed to management of underlying storage based on different sets of policies. When certain snapshots expire and are ready for deletion, the technique is directed to finding those data blocks that are no longer referenced (used) by any valid snapshots.
    Type: Application
    Filed: October 29, 2021
    Publication date: March 16, 2023
    Inventors: Abhishek Gupta, Andrey Alexseyevich Pyatkov, Angshuman Bezbaruah, Artem Yevgenyevich Livshits, Brajesh Kumar Shrivastava, Karan Gupta, Prakash Narayanasamy
  • Publication number: 20230076070
    Abstract: The techniques described herein increase the throughput of a single VPN connection by creating multiple outbound and/or inbound Security Associations (SAs). For instance, two or more different SAs can encrypt outbound data packets to be sent over the VPN connection to a remote device. Moreover, two or more different SAs can decrypt inbound data packets received over the VPN connection from the remote device. Each of the SAs can be bound to a different processing core via the use of a Security Parameter Index (SPI) identifier. Consequently, inbound data packets communicated over a single VPN connection from a remote device to a physical host in a VPN gateway can be distributed amongst multiple processing cores for decryption purposes. Further, outbound data packets to be communicated over the single VPN connection from the physical host to the remote device can be distributed amongst multiple processing cores for encryption purposes.
    Type: Application
    Filed: September 16, 2022
    Publication date: March 9, 2023
    Inventors: Abhishek GUPTA, Shivakumar THANGAPANDI, Vikrant ARORA
  • Publication number: 20230060767
    Abstract: A system and method are disclosed for performing, by a processor of an information handling system, an inventory of updateable components of the information handling system. The system and method also includes retrieving an update path catalog for the updateable component and determining published updates between a current version and a target version of the updateable component according to the update path catalog. In addition, the system and method includes determining update recommendations based on the published updates between the current version and the target version. Finally, the system and method includes consolidating the update recommendations into the consolidated update recommendation according to a criterion.
    Type: Application
    Filed: August 31, 2021
    Publication date: March 2, 2023
    Inventors: Chandrasekhar Revuri, Raveendra Babu Madala, Rushyendra Velamuri, Winston X. Fernandes, Praveen Lalgoudar, Abhishek Gupta
  • Publication number: 20230055792
    Abstract: A method for servicing a section of a first flow line of a redundant flow line system with a second flow line in a closed-loop liquid cooling system. The method can include draining liquid from the first flow line through a liquid transfer assembly and servicing the section of the first flow line. The method can also include transferring liquid from the second flow line to the first flow line through the liquid transfer assembly and decoupling the liquid transfer assembly from the first flow line and the second flow line. The method can also include coupling the liquid transfer assembly to and between the first flow line and the second flow line.
    Type: Application
    Filed: August 23, 2022
    Publication date: February 23, 2023
    Inventors: Matthew R. Archibald, Stefan Djuranec, Allen DeMars, Abhishek Gupta, Michael J. Koehler
  • Publication number: 20230044503
    Abstract: Systems and methods take into account the criticality of workloads, the warranty needs of workloads, the warranty available time, and the lifetime of a workload to provide an optimal solution that ensures servers are used to highest extent. The warranty health of servers is computed and categorized as critical, warning, or healthy based on the number of days remaining in warranty. Workloads are tagged as short-term or long-term workloads. Workloads are also classified based on criticality. The quarantine mode for proactive high availability of servers is divided into multiple modes, including a long-time, critical-workload quarantine mode, a critical-workload quarantine mode, and a standard quarantine mode. Servers that are in quarantine mode are assigned new workloads based upon the warranty health, workload term, and workload criticality.
    Type: Application
    Filed: August 24, 2021
    Publication date: February 9, 2023
    Applicant: Dell Products, L.P.
    Inventors: Vaideeswaran Ganesan, Praveen Lalgoudar, Rushyendra Velamuri, Winston X. Fernandes, Pandiyan Varadharajan, Rekha MS, Abhishek Gupta
  • Publication number: 20230029677
    Abstract: An indexing technique provides an index data structure for efficient retrieval of a snapshot from a long-term storage service (LTSS) of an archival storage system. The snapshot is generated from typed data of a logical entity, such as a virtual disk (vdisk). The data of the snapshot is replicated to a frontend data service of the LTSS sequentially and organized as one or more data objects for storage by a backend data service of LTSS in an object store of the archival storage system. Metadata associated with the snapshot (i.e., snapshot metadata) is recorded as a log and persistently stored on storage media local to the frontend data service. The snapshot metadata includes information describing the snapshot data, e.g., a logical offset range of a snapshot of the vdisk and, thus, is used to construct the index data structure. Notably, construction of the index data structure is deferred until after the entirety of the snapshot data has been replicated and received by the frontend data service.
    Type: Application
    Filed: September 28, 2021
    Publication date: February 2, 2023
    Inventors: Abhishek Gupta, Andrey Alexseyevich Pyatkov, Angshuman Bezbaruah, Artem Yevgenyevich Livshits, Brajesh Kumar Shrivastava, Karan Gupta, Prakash Narayanasamy
  • Publication number: 20230028803
    Abstract: A disclosed workload distribution method determines a yield index for each microservice associated with a containerized application executing on a potentially heterogeneous cluster information handling systems. Each microservice is then assigned to one of N priority categories based on its yield index, where three is an acceptable, but not exclusive, value of N. Resource configuration profiles are maintained for each of the priority categories. Each resource configuration profile assigns a resource configuration to each microservice. An information handling resource associated with a particular microservice is configured in accordance with the resource configuration assigned to the particular microservice by a particular resource configuration profile corresponding to the yield index. In this manner, workloads can be assigned and resources configured in accordance with the containerized application's priorities as exposed by the value indices.
    Type: Application
    Filed: July 23, 2021
    Publication date: January 26, 2023
    Applicant: Dell Products L.P.
    Inventors: Chandrasekhar REVURI, Abhishek GUPTA, Rishi CHANDRA, Anand CHANGEGOWDA, Ravishankar Kanakapura NANJUNDASWAMY
  • Publication number: 20230029280
    Abstract: Systems and methods provide a logical-physical warranty that is applied to nodes at a logical grouping level, such as a cluster. A logical warranty is associated with the nodes in the logical group or cluster in addition to each node's original individual warranty. The logical warranty stretches the expiration dates for individual warranties to a worst-case date inside the logical group. Customers build, teardown and extend the clusters, and the logical warranty is assigned to nodes in the cluster. The logical warranty is associated with a cluster of a defined size, such as a number of nodes expected, which can be expanded in the future as needed. The logical warranty ensures that there is uniform Service Level Agreement (SLA) for the nodes in the cluster during the warranty lifetime thereby simplifying the support for the cluster.
    Type: Application
    Filed: August 24, 2021
    Publication date: January 26, 2023
    Applicant: Dell Products, L.P.
    Inventors: Vaideeswaran Ganesan, Praveen Lalgoudar, Winston X. Fernandes, Abhishek Gupta, Pandiyan Varadharajan, Rekha MS
  • Publication number: 20230027027
    Abstract: Systems and methods are disclosed for warranty recommendations for users based upon warranty selections of peer users. The users are clustered into peer groups based upon industry or market segment based upon user data including primary variables, such as workload type data and market segment data, and secondary variables, such as virtual machine size or number, cluster size, cost, and downtime. New users are matched to a top similar user within their peer group based upon a vector distance, wherein the vector comprises the primary and secondary variables. A current warranty of the top similar user is recommended to the new user. Warranty changes by members of a peer group cause trigger an updated ranking of the peer group warranties. Expert user comments and rankings are used to generate expert user recommendations. A cost-based impact assessment may also be used for warranty recommendations by highlighting favorable and unfavorable warranty properties.
    Type: Application
    Filed: August 24, 2021
    Publication date: January 26, 2023
    Applicant: Dell Products, L.P.
    Inventors: Vaideeswaran Ganesan, Praveen Lalgoudar, Varsha Berya, Rushyendra Velamuri, Abhishek Gupta, Pandiyan Varadharajan
  • Patent number: 11549709
    Abstract: A system for allocating resources across equipment that operate to serve one or more loads of a building. The system includes one or more memory devices storing instructions that cause one or more processors to receive operational data defining at least one of planned loads to be served by the equipment or utility rates for one or more time steps within a simulation period, determine whether the operational data define the planned loads or the utility rates for each time step within the simulation period, and in response to a determination that the operational data do not define the planned loads or the utility rates for each time step within the simulation period, identify one or more time steps for which the planned loads or the utility rates are not defined and initiate an action to define the planned loads or the utility rates for the identified time steps.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: January 10, 2023
    Assignee: JOHNSON CONTROLS TYCO IP HOLDINGS LLP
    Inventors: Payal Rajendra Pancholi, Vinay Deelip Varne, Apoorva Gupta, Abhishek Gupta, Mahesh Balkisan Mutyal, Manohar Madhukar Kulkarni
  • Publication number: 20220398873
    Abstract: The use of multiple horizon optimization for vehicle dynamics and powertrain control of a vehicle is provided. Long horizon optimization for a trip of the vehicle is performed, and an optimal value function is determined. Data is received from powertrain and/or connectivity features from one or more of components of the vehicle. Short horizon optimization for the trip is performed using a rollout algorithm, the optimal value function, and the received data. The operation of the vehicle is adjusted using results of the short horizon optimization.
    Type: Application
    Filed: November 6, 2020
    Publication date: December 15, 2022
    Inventors: Marcello CANOVA, Shreshta RAJAKUMAR DESHPANDE, Shobhit GUPTA, Abhishek GUPTA
  • Publication number: 20220385637
    Abstract: The techniques described herein enable a virtual private network (VPN) gateway to select a VPN connection, from multiple VPN connections established between a network VPN gateway and a remote VPN gateway, based on performance factors such as throughput. A system may measure throughput in megabytes per second (Mbps). More specifically, a VPN gateway (e.g., a remote VPN gateway or a network VPN gateway) can configure a routing preference that selects a VPN connection that is more performant based on a cryptographic algorithm that is used for the VPN connection. The VPN gateway can update the routing preference to select an alternative VPN connection when the performance of the VPN connection suffers.
    Type: Application
    Filed: November 3, 2021
    Publication date: December 1, 2022
    Inventors: Shivakumar THANGAPANDI, Abhishek GUPTA, Vikrant ARORA, Arun VENKATACHALAM
  • Patent number: 11513914
    Abstract: Methods, systems and computer program products for high-availability computing. In a computing configuration comprising a primary node, a first backup node, and a second backup node, a particular data state is restored to the primary node from a backup snapshot at the second backup node. Firstly, a snapshot coverage gap is identified between a primary node snapshot at the primary node and the backup snapshot at the second backup node. Next, intervening snapshots at the first backup node that fills the snapshot coverage gap are identified and located. Having both the backup snapshot from the second backup node and the intervening snapshots from the first backup node, the particular data state at the primary node is restored by performing differencing operations between the primary node snapshot, the backup snapshot from the second backup node, and the intervening snapshots of the first backup node.
    Type: Grant
    Filed: December 31, 2020
    Date of Patent: November 29, 2022
    Assignee: Nutanix, Inc.
    Inventors: Abhishek Gupta, Brajesh Kumar Shrivastava
  • Patent number: 11507553
    Abstract: Exemplary methods, apparatuses, and systems include a file system process inserting a first key/value pair and a second key/value pair into a first tree. The second key is a duplicate of the first key and the value of the second key/value pair is an operation changing the value. In response to a request for a range of key/value pairs, the process reads the second key/value pair and inserts it in a second tree. The process reads the first pair and determines, while inserting the first pair in the second tree, that the second key is a duplicate of the first key. The file system process determines an updated value of the first value by applying the operation in the second value to first value. The file system operation updates the second key/value pair in the second tree with the updated value and returns the requested range of key/value pairs.
    Type: Grant
    Filed: March 20, 2018
    Date of Patent: November 22, 2022
    Assignee: VMware, Inc.
    Inventors: Abhishek Gupta, Rob T. Johnson, Srinath Premachandran, Richard P. Spillane, Sandeep Rangaswamy, Jorge Guerra Delgado, Kapil Chowksey, Wenguang Wang
  • Patent number: 11509536
    Abstract: Relay functionality may be provided. A network device may receive a response packet and may determine that one of Option-82 and Option-18 information is not present in the received response packet. Next, in response to determining that one of Option-82 and Option-18 information is not present in the received response packet, a database may be queried for information associated with the response packet. Then, based on the information associated with the response packet, the response packet may be sent to a client device associated with the response packet.
    Type: Grant
    Filed: October 20, 2020
    Date of Patent: November 22, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Vedashree Bagade, Ajay Kumar Modi, Umamaheswararao Karyampudi, Abhishek Gupta
  • Patent number: 11507271
    Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more processes may: receive performance information for a base workload; determine multiple threshold values of multiple storage media layers of each IHS of a storage cluster based at least on the performance information for the base workload and multiple inventory information respectively associated with multiple storage media layers of each IHS of the storage cluster; receive multiple condition values respectively associated with the multiple storage media layers of an IHS of the storage cluster; determine that a condition value of the multiple condition values associated with a storage media layer of the multiple storage media layers is at or below a threshold value of the multiple threshold values associated with the storage media layer of the multiple storage media layers; and reduce a storage workload of a specific IHS of the storage cluster.
    Type: Grant
    Filed: July 27, 2021
    Date of Patent: November 22, 2022
    Assignee: Dell Products L.P.
    Inventors: Chandrasekhar R, Ravishankar N. Kanakapura, Abhishek Gupta, Anand Changegowda, Rishi Chandra, Kevin Marks
  • Publication number: 20220368631
    Abstract: The techniques described herein enable the establishment of two simultaneous virtual private network (VPN) connections between a VPN gateway and a VPN client. The system is configured to update a routing table advertised to network resources when a VPN server instance fails and/or is taken offline. When a first VPN server instance fails and/or is taken offline, the first VPN server instance releases a claim of ownership on its range of IP addresses. After this release occurs, the second VPN server instance is configured to claim ownership of the range of IP addresses that used to be owned by the first VPN server instance. This updated claim of ownership is captured in an updated routing table that can then be advertised to the network resources. Consequently, the network resources use this updated routing table to correctly determine which VPN server instance to send data intended for the VPN client.
    Type: Application
    Filed: May 13, 2021
    Publication date: November 17, 2022
    Inventors: Deepak NARULA, Shivakumar THANGAPANDI, Vikrant ARORA, Abhishek GUPTA, Amit Kumar NANDA, Akshat KALE
  • Publication number: 20220368675
    Abstract: The techniques described herein enable the establishment of two simultaneous virtual private network (VPN) connections for a VPN client operating on a remote computing device. The VPN client can establish first VPN connection with a first VPN server instance of a VPN gateway and a second VPN connection with a second VPN server instance of the VPN gateway. To establish two simultaneous VPN connections, the VPN client is configured to create and/or use two Transmission Control Protocol (TCP) sockets. In one example, a first VPN connection can be a primary VPN connection and a second VPN connection can be a dormant VPN connection configured as a backup in case of a service interruption with the first VPN connection. In another example, a data flow can be split across the first and second VPN connections, or alternate between using the first and second VPN connections, based on performance parameters.
    Type: Application
    Filed: May 13, 2021
    Publication date: November 17, 2022
    Inventors: Deepak NARULA, Shivakumar THANGAPANDI, Vikrant ARORA, Abhishek GUPTA, Amol WATE, Simran Rajkumar NAGRANI, Nilambari Narayan DESHPANDE, Ning WEI