Patents by Inventor Ajay Dholakia

Ajay Dholakia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240004440
    Abstract: A computer-implemented method includes identifying a plurality of adapter modules of a particular adapter module type that are installed in a plurality of slots of a single host computer, and identifying, for each of the identified adapter modules, a slot of the plurality of slots in which the adapter module is installed. The method may further includes accessing, for each identified slot, a predetermined relative thermal efficiency value for operation of an adapter module of the particular adapter module type in a particular slot, and controlling, for one or more of the identified adapter modules, the operation of the identified adapter module based on the predetermined relative thermal efficiency value for the slot in which the identified adapter module is installed. A computer program product may also include program instructions that are executable by a processor to cause the processor to perform the method.
    Type: Application
    Filed: July 1, 2022
    Publication date: January 4, 2024
    Inventors: Gary D. Cudak, Vinod Kamath, Ajay Dholakia, Miroslav Hodak
  • Patent number: 11790627
    Abstract: A method for using an object key to deprioritize processing of relative regions of images of an object includes capturing an image of an object to be tracked and selecting an object key of the object. The object key includes a portion of the object, the object key is attached to the object and is recognizable by an image capture device. The method includes calculating a relative size of the object key with respect to a size of the object and a location of the object key with respect to the object, and tracking one or more locations of the object from the relative size and location of the object with respect to the object key and by capturing a plurality of images of the object key at a resolution sufficient for tracking movement of the object key.
    Type: Grant
    Filed: January 20, 2022
    Date of Patent: October 17, 2023
    Assignee: Lenovo Global Technology (United States) Inc.
    Inventors: Gary D Cudak, Fred Allison Bower, III, Srihari V. Angaluri, Ajay Dholakia, David W. Cosby, Jian Li
  • Publication number: 20230297431
    Abstract: A method includes identifying hardware resource requirements of a candidate workload instance, wherein the hardware resource requirements of the workload instance include a required capacity for each of a plurality of hardware resource types. The method further includes identifying, for each of the plurality of hardware resource types required by the candidate workload instance, a capacity of a hardware resource of the hardware resource type that is currently available on a server without causing a power efficiency of the hardware resource to decline below a setpoint power efficiency; and determining, for each of the plurality of hardware resource types required by the candidate workload instance, whether the identified capacity of the hardware resource on the server is greater than or equal to the required capacity for the hardware resource type. The determination may support a decision to place the workload instance on the server or another server.
    Type: Application
    Filed: March 17, 2022
    Publication date: September 21, 2023
    Inventors: Gary D Cudak, Ajay Dholakia, Srihari V Angaluri, Paul T. Artman
  • Publication number: 20230230336
    Abstract: A method for using an object key to deprioritize processing of relative regions of images of an object includes capturing an image of an object to be tracked and selecting an object key of the object. The object key includes a portion of the object, the object key is attached to the object and is recognizable by an image capture device. The method includes calculating a relative size of the object key with respect to a size of the object and a location of the object key with respect to the object, and tracking one or more locations of the object from the relative size and location of the object with respect to the object key and by capturing a plurality of images of the object key at a resolution sufficient for tracking movement of the object key.
    Type: Application
    Filed: January 20, 2022
    Publication date: July 20, 2023
    Inventors: Gary D Cudak, Fred Allison Bower, III, Srihari V. Angaluri, Ajay Dholakia, David W. Cosby, Jian Li
  • Patent number: 11362980
    Abstract: An apparatus, system, method, and program product are disclosed for sending messages to an unavailable device. The apparatus includes a status module that determines that a recipient device for a message is unavailable to receive the message. The apparatus includes a message module that sends the message to an intermediate device for storage until the recipient device is available to receive the message in response to determining that the recipient device is unavailable to receive the message. The apparatus includes a notification module that sends a notification to the recipient device that the message is available to access from the intermediate device.
    Type: Grant
    Filed: August 18, 2016
    Date of Patent: June 14, 2022
    Assignee: LENOVO Enterprise Solutions (Singapore) PTE. LTD.
    Inventors: Gary D. Cudak, Srihari V. Angaluri, Ajay Dholakia, Jarrod B. Johnson, Bryan L. Young
  • Patent number: 10997288
    Abstract: Detecting a compromised system using an integrated management controller including receiving a workload characterization for an expected hardware utilization of a computing system, wherein the workload characterization is a pattern of expected hardware utilization of computing hardware on the computing system, and wherein the workload characterization comprises hardware utilization thresholds; storing the workload characterization on an integrated management controller communicatively coupled to the computing hardware on the computing system; monitoring the computing hardware of the computing system using the integrated management controller, including comparing the hardware utilization thresholds of the workload characterization to measured hardware utilization of the computing hardware; determining that the computing system is compromised based on detecting that the measured hardware utilization of the computing hardware has exceeded one of the hardware utilization thresholds of the workload characterizatio
    Type: Grant
    Filed: March 23, 2018
    Date of Patent: May 4, 2021
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Gary D. Cudak, John M. Petersen, Shareef F. Alshinnawi, Ajay Dholakia
  • Patent number: 10992751
    Abstract: A computer program product provides a non-volatile computer readable medium and non-transitory program instructions embodied therein, where the program instructions are configured to be executable by a processor to cause the processor to perform various operations. The operations may comprise identifying a dataset that is being used by a first workload running on a first host server within a computing system and a second workload running on a second host server within the computing system, wherein each of the host servers within the computing system are connected for communication over a network including a network switch. The operations may further comprise identifying a data storage device that is directly attached to the network switch within the network, migrating the identified dataset to the identified data storage device, and causing the first and second workloads to send dataset access requests to the identified dataset on the identified data storage device.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: April 27, 2021
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Gary D. Cudak, Fred A. Bower, III, Ajay Dholakia
  • Patent number: 10944839
    Abstract: Conveying potential communication methods for a user of a computing system network, including: determining whether a user account for a real-time communications application (RTCA) is installed on a first inactive user device; if the user account for the RTCA is installed on the first inactive user device: calculating a proximity between a location of the first inactive user device and a user location; determining a status for the RTCA account based on the proximity between the location of the first inactive user device and the user location, wherein the status indicates a user's potential availability to utilize the RTCA account for communications; and sending the status for the RTCA account to another device.
    Type: Grant
    Filed: February 25, 2016
    Date of Patent: March 9, 2021
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Srihari V. Angaluri, Nagananda Chumbalkar, Gary D. Cudak, Ajay Dholakia
  • Patent number: 10853462
    Abstract: An apparatus for authorizing file access events includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to record hardware usage patterns prior to a file access event of a file, and correlate the hardware usage patterns with file access events targeting the file. The code is also executable to receive a file access event targeting the file, compare a hardware usage pattern preceding the received file access event targeting the file to the hardware usage patterns correlated with file access events targeting the file, and authorize the received file access event in response to the hardware usage pattern preceding the received file access event targeting the file matching a hardware usage pattern correlated to a file access event targeting the file.
    Type: Grant
    Filed: April 3, 2018
    Date of Patent: December 1, 2020
    Assignee: LENOVO Enterprise Solutions (Singapore) PTE. LTD
    Inventors: Gary D. Cudak, John M. Petersen, Shareef F. Alshinnawi, Ajay Dholakia
  • Patent number: 10819607
    Abstract: A method includes obtaining component utilization data for multiple components of a compute node during at least one previous execution of a workload. The method further includes using the component utilization data to identify a first component having a utilization level that is less than a threshold utilization level during the at least one previous execution of the workload, wherein the first component is one of the multiple components of the compute node. The method still further includes, during a subsequent execution of the workload on the compute node, throttling the first component to prevent the first component from exceeding the threshold utilization level.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: October 27, 2020
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Srihari V. Angaluri, Gary D. Cudak, Ajay Dholakia, Chulho Kim
  • Patent number: 10764321
    Abstract: Methods and systems of identifying and remediating at-risk resources in a computing environment are provided. A method includes periodically determining respective infrastructure topologies of a computing environment that changes over time, wherein the determining is performed by a computer system communicating with the computing environment. The method also includes: identifying, by the computer system, an intrusion event in the computing environment; determining, by the computer system, at-risk resources in the computing environment based on the determined intrusion event and a corresponding one of the infrastructure topologies; and performing, by the computer system, remediation action for the at-risk resources.
    Type: Grant
    Filed: March 24, 2016
    Date of Patent: September 1, 2020
    Assignee: LENOVO Enterprise Solutions (Singapore) PTE. LTD
    Inventors: Fred Allison Bower, III, Gary David Cudak, Ajay Dholakia, William Gavin Holland, Scott Kelso
  • Patent number: 10616064
    Abstract: A computer program product includes a computer readable medium having computer readable program instructions configured to cause a processor to: track resource requirements for a workload deployed to a virtual environment; monitor one or more health characteristics of one or more systems of the virtual environment; determine whether one or more soft reservations corresponding to the workload should be created on one or more of the systems of the virtual environment; and in response to determining the one or more soft reservations corresponding to the workload should be created, creating the one or more soft reservations on the one or more of the systems of the virtual environment. The one or more of the systems of the virtual environment on which the one or more soft reservations are created are preferably different systems than the system to which the workload was originally deployed. Corresponding systems and methods are also disclosed.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: April 7, 2020
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Gary David Cudak, Nagananda Chumbalkar, Srihari Venkata Angaluri, Ajay Dholakia
  • Patent number: 10552229
    Abstract: Systems and methods for determining placement of computing workloads within a network are disclosed. According to an aspect, a method includes determining one or more attributes of a computing workload to be placed within a network. The method also includes predicting interaction of the computing workload with one or more other computing workloads within the network based on the one or more attributes. Further, the method includes determining placement of the computing workload within the network based on the predicted interaction and a topology of the network.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: February 4, 2020
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Shareef F. Alshinnawi, Gary D. Cudak, Ajay Dholakia, John M. Petersen
  • Patent number: 10552600
    Abstract: In one embodiment, a system includes a media storage device, a processor, and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to associate a first subset of storage space on the media storage device with a first group of applications executing on a hardware processor. The logic is also configured to cause the processor to receive a request from an application to access the first subset of storage space on the media storage device. Moreover, the logic is configured to cause the processor to prevent any application other than an application from the first group of applications from accessing the first subset of storage space on the media storage device. Other systems, methods, and computer program products for defending against ransomware attacks on devices and systems using application authority assignment are described according to more embodiments.
    Type: Grant
    Filed: November 2, 2016
    Date of Patent: February 4, 2020
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: John Michael Petersen, Gary David Cudak, Shareef Fathi Alshinnawi, Ajay Dholakia
  • Publication number: 20190303547
    Abstract: An apparatus for authorizing file access events includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to record hardware usage patterns prior to a file access event of a file, and correlate the hardware usage patterns with file access events targeting the file. The code is also executable to receive a file access event targeting the file, compare a hardware usage pattern preceding the received file access event targeting the file to the hardware usage patterns correlated with file access events targeting the file, and authorize the received file access event in response to the hardware usage pattern preceding the received file access event targeting the file matching a hardware usage pattern correlated to a file access event targeting the file.
    Type: Application
    Filed: April 3, 2018
    Publication date: October 3, 2019
    Inventors: GARY D. CUDAK, JOHN M. PETERSEN, SHAREEF F. ALSHINNAWI, AJAY DHOLAKIA
  • Publication number: 20190294782
    Abstract: Detecting a compromised system using an integrated management controller including receiving a workload characterization for an expected hardware utilization of a computing system, wherein the workload characterization is a pattern of expected hardware utilization of computing hardware on the computing system, and wherein the workload characterization comprises hardware utilization thresholds; storing the workload characterization on an integrated management controller communicatively coupled to the computing hardware on the computing system; monitoring the computing hardware of the computing system using the integrated management controller, including comparing the hardware utilization thresholds of the workload characterization to measured hardware utilization of the computing hardware; determining that the computing system is compromised based on detecting that the measured hardware utilization of the computing hardware has exceeded one of the hardware utilization thresholds of the workload characterizatio
    Type: Application
    Filed: March 23, 2018
    Publication date: September 26, 2019
    Inventors: GARY D. CUDAK, JOHN M. PETERSEN, SHAREEF F. ALSHINNAWI, AJAY DHOLAKIA
  • Patent number: 10394492
    Abstract: According to one embodiment, a system includes a media storage device, a processor, and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to determine a write rate for the media storage device or a portion thereof based on one or more factors, the write rate ranging from zero to a maximum possible write rate for the media storage device or the portion thereof. The logic is also configured to cause the processor to receive a write request to write data to the media storage device or the portion thereof and write the data to the media storage device using the determined write rate. Other systems, methods, and computer program products for defending against ransomware attacks are presented according to more embodiments.
    Type: Grant
    Filed: October 26, 2016
    Date of Patent: August 27, 2019
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: John Michael Petersen, Gary David Cudak, Shareef Fathi Alshinnawi, Ajay Dholakia
  • Patent number: 10298388
    Abstract: A workload server computing device receives a workload encryption key from a workload client computing device over a network. The workload encryption key is encrypted with a public encryption key of the workload server computing device. The workload server computing device decrypts the workload encryption key using a private encryption key of the workload server computing device corresponding to the public encryption key. The workload server computing device receives a workload from the workload client computing device over the network. The workload is encrypted with the workload encryption key. The workload server computing device decrypts the workload using the workload encryption key, and executes the decrypted workload for the workload client computing device.
    Type: Grant
    Filed: June 10, 2016
    Date of Patent: May 21, 2019
    Assignee: Lenovo Enterprise Solutions (Singapore) PTE. LTD.
    Inventors: Fred Allison Bower, III, Ajay Dholakia, Gregory B. Pruett, Christopher Landon Wood
  • Publication number: 20190025927
    Abstract: A computing device includes a processor and computer readable media storing program instructions executable by the processor to receive a user gesture through a first input device and obtain external data through a second input device. The program instructions are further executable by the processor to access a plurality of records, each record associating a control action with a combination of a user gesture definition and an external data criterion, and to identify, using the plurality of records, a control action that is associated with both a user gesture definition that is satisfied by the received user gesture and an external data criterion that is satisfied by the obtained external data. In addition, the program instructions are executable by a processor to execute the identified control action on the computing device.
    Type: Application
    Filed: July 24, 2017
    Publication date: January 24, 2019
    Inventors: Gary D. Cudak, Michael A. Perks, Srihari V. Angaluri, Ajay Dholakia
  • Patent number: 10185379
    Abstract: Systems and methods for usage of secondary power supplies in computing environments based on risk and cost assessments are disclosed. According to an aspect, a method includes determining a risk value to a primary power source of a need to utilize a secondary power source for powering a plurality of computing devices. The method includes using the secondary power source to power a portion of the computing devices based on the determined risk value.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: January 22, 2019
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Paul Artman, Fred A. Bower, Gary D. Cudak, Ajay Dholakia