Patents by Inventor Ajay Dholakia

Ajay Dholakia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11362980
    Abstract: An apparatus, system, method, and program product are disclosed for sending messages to an unavailable device. The apparatus includes a status module that determines that a recipient device for a message is unavailable to receive the message. The apparatus includes a message module that sends the message to an intermediate device for storage until the recipient device is available to receive the message in response to determining that the recipient device is unavailable to receive the message. The apparatus includes a notification module that sends a notification to the recipient device that the message is available to access from the intermediate device.
    Type: Grant
    Filed: August 18, 2016
    Date of Patent: June 14, 2022
    Assignee: LENOVO Enterprise Solutions (Singapore) PTE. LTD.
    Inventors: Gary D. Cudak, Srihari V. Angaluri, Ajay Dholakia, Jarrod B. Johnson, Bryan L. Young
  • Patent number: 10997288
    Abstract: Detecting a compromised system using an integrated management controller including receiving a workload characterization for an expected hardware utilization of a computing system, wherein the workload characterization is a pattern of expected hardware utilization of computing hardware on the computing system, and wherein the workload characterization comprises hardware utilization thresholds; storing the workload characterization on an integrated management controller communicatively coupled to the computing hardware on the computing system; monitoring the computing hardware of the computing system using the integrated management controller, including comparing the hardware utilization thresholds of the workload characterization to measured hardware utilization of the computing hardware; determining that the computing system is compromised based on detecting that the measured hardware utilization of the computing hardware has exceeded one of the hardware utilization thresholds of the workload characterizatio
    Type: Grant
    Filed: March 23, 2018
    Date of Patent: May 4, 2021
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Gary D. Cudak, John M. Petersen, Shareef F. Alshinnawi, Ajay Dholakia
  • Patent number: 10992751
    Abstract: A computer program product provides a non-volatile computer readable medium and non-transitory program instructions embodied therein, where the program instructions are configured to be executable by a processor to cause the processor to perform various operations. The operations may comprise identifying a dataset that is being used by a first workload running on a first host server within a computing system and a second workload running on a second host server within the computing system, wherein each of the host servers within the computing system are connected for communication over a network including a network switch. The operations may further comprise identifying a data storage device that is directly attached to the network switch within the network, migrating the identified dataset to the identified data storage device, and causing the first and second workloads to send dataset access requests to the identified dataset on the identified data storage device.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: April 27, 2021
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Gary D. Cudak, Fred A. Bower, III, Ajay Dholakia
  • Patent number: 10944839
    Abstract: Conveying potential communication methods for a user of a computing system network, including: determining whether a user account for a real-time communications application (RTCA) is installed on a first inactive user device; if the user account for the RTCA is installed on the first inactive user device: calculating a proximity between a location of the first inactive user device and a user location; determining a status for the RTCA account based on the proximity between the location of the first inactive user device and the user location, wherein the status indicates a user's potential availability to utilize the RTCA account for communications; and sending the status for the RTCA account to another device.
    Type: Grant
    Filed: February 25, 2016
    Date of Patent: March 9, 2021
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Srihari V. Angaluri, Nagananda Chumbalkar, Gary D. Cudak, Ajay Dholakia
  • Patent number: 10853462
    Abstract: An apparatus for authorizing file access events includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to record hardware usage patterns prior to a file access event of a file, and correlate the hardware usage patterns with file access events targeting the file. The code is also executable to receive a file access event targeting the file, compare a hardware usage pattern preceding the received file access event targeting the file to the hardware usage patterns correlated with file access events targeting the file, and authorize the received file access event in response to the hardware usage pattern preceding the received file access event targeting the file matching a hardware usage pattern correlated to a file access event targeting the file.
    Type: Grant
    Filed: April 3, 2018
    Date of Patent: December 1, 2020
    Assignee: LENOVO Enterprise Solutions (Singapore) PTE. LTD
    Inventors: Gary D. Cudak, John M. Petersen, Shareef F. Alshinnawi, Ajay Dholakia
  • Patent number: 10819607
    Abstract: A method includes obtaining component utilization data for multiple components of a compute node during at least one previous execution of a workload. The method further includes using the component utilization data to identify a first component having a utilization level that is less than a threshold utilization level during the at least one previous execution of the workload, wherein the first component is one of the multiple components of the compute node. The method still further includes, during a subsequent execution of the workload on the compute node, throttling the first component to prevent the first component from exceeding the threshold utilization level.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: October 27, 2020
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Srihari V. Angaluri, Gary D. Cudak, Ajay Dholakia, Chulho Kim
  • Patent number: 10764321
    Abstract: Methods and systems of identifying and remediating at-risk resources in a computing environment are provided. A method includes periodically determining respective infrastructure topologies of a computing environment that changes over time, wherein the determining is performed by a computer system communicating with the computing environment. The method also includes: identifying, by the computer system, an intrusion event in the computing environment; determining, by the computer system, at-risk resources in the computing environment based on the determined intrusion event and a corresponding one of the infrastructure topologies; and performing, by the computer system, remediation action for the at-risk resources.
    Type: Grant
    Filed: March 24, 2016
    Date of Patent: September 1, 2020
    Assignee: LENOVO Enterprise Solutions (Singapore) PTE. LTD
    Inventors: Fred Allison Bower, III, Gary David Cudak, Ajay Dholakia, William Gavin Holland, Scott Kelso
  • Patent number: 10616064
    Abstract: A computer program product includes a computer readable medium having computer readable program instructions configured to cause a processor to: track resource requirements for a workload deployed to a virtual environment; monitor one or more health characteristics of one or more systems of the virtual environment; determine whether one or more soft reservations corresponding to the workload should be created on one or more of the systems of the virtual environment; and in response to determining the one or more soft reservations corresponding to the workload should be created, creating the one or more soft reservations on the one or more of the systems of the virtual environment. The one or more of the systems of the virtual environment on which the one or more soft reservations are created are preferably different systems than the system to which the workload was originally deployed. Corresponding systems and methods are also disclosed.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: April 7, 2020
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Gary David Cudak, Nagananda Chumbalkar, Srihari Venkata Angaluri, Ajay Dholakia
  • Patent number: 10552600
    Abstract: In one embodiment, a system includes a media storage device, a processor, and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to associate a first subset of storage space on the media storage device with a first group of applications executing on a hardware processor. The logic is also configured to cause the processor to receive a request from an application to access the first subset of storage space on the media storage device. Moreover, the logic is configured to cause the processor to prevent any application other than an application from the first group of applications from accessing the first subset of storage space on the media storage device. Other systems, methods, and computer program products for defending against ransomware attacks on devices and systems using application authority assignment are described according to more embodiments.
    Type: Grant
    Filed: November 2, 2016
    Date of Patent: February 4, 2020
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: John Michael Petersen, Gary David Cudak, Shareef Fathi Alshinnawi, Ajay Dholakia
  • Patent number: 10552229
    Abstract: Systems and methods for determining placement of computing workloads within a network are disclosed. According to an aspect, a method includes determining one or more attributes of a computing workload to be placed within a network. The method also includes predicting interaction of the computing workload with one or more other computing workloads within the network based on the one or more attributes. Further, the method includes determining placement of the computing workload within the network based on the predicted interaction and a topology of the network.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: February 4, 2020
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Shareef F. Alshinnawi, Gary D. Cudak, Ajay Dholakia, John M. Petersen
  • Publication number: 20190303547
    Abstract: An apparatus for authorizing file access events includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to record hardware usage patterns prior to a file access event of a file, and correlate the hardware usage patterns with file access events targeting the file. The code is also executable to receive a file access event targeting the file, compare a hardware usage pattern preceding the received file access event targeting the file to the hardware usage patterns correlated with file access events targeting the file, and authorize the received file access event in response to the hardware usage pattern preceding the received file access event targeting the file matching a hardware usage pattern correlated to a file access event targeting the file.
    Type: Application
    Filed: April 3, 2018
    Publication date: October 3, 2019
    Inventors: GARY D. CUDAK, JOHN M. PETERSEN, SHAREEF F. ALSHINNAWI, AJAY DHOLAKIA
  • Publication number: 20190294782
    Abstract: Detecting a compromised system using an integrated management controller including receiving a workload characterization for an expected hardware utilization of a computing system, wherein the workload characterization is a pattern of expected hardware utilization of computing hardware on the computing system, and wherein the workload characterization comprises hardware utilization thresholds; storing the workload characterization on an integrated management controller communicatively coupled to the computing hardware on the computing system; monitoring the computing hardware of the computing system using the integrated management controller, including comparing the hardware utilization thresholds of the workload characterization to measured hardware utilization of the computing hardware; determining that the computing system is compromised based on detecting that the measured hardware utilization of the computing hardware has exceeded one of the hardware utilization thresholds of the workload characterizatio
    Type: Application
    Filed: March 23, 2018
    Publication date: September 26, 2019
    Inventors: GARY D. CUDAK, JOHN M. PETERSEN, SHAREEF F. ALSHINNAWI, AJAY DHOLAKIA
  • Patent number: 10394492
    Abstract: According to one embodiment, a system includes a media storage device, a processor, and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to determine a write rate for the media storage device or a portion thereof based on one or more factors, the write rate ranging from zero to a maximum possible write rate for the media storage device or the portion thereof. The logic is also configured to cause the processor to receive a write request to write data to the media storage device or the portion thereof and write the data to the media storage device using the determined write rate. Other systems, methods, and computer program products for defending against ransomware attacks are presented according to more embodiments.
    Type: Grant
    Filed: October 26, 2016
    Date of Patent: August 27, 2019
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: John Michael Petersen, Gary David Cudak, Shareef Fathi Alshinnawi, Ajay Dholakia
  • Patent number: 10298388
    Abstract: A workload server computing device receives a workload encryption key from a workload client computing device over a network. The workload encryption key is encrypted with a public encryption key of the workload server computing device. The workload server computing device decrypts the workload encryption key using a private encryption key of the workload server computing device corresponding to the public encryption key. The workload server computing device receives a workload from the workload client computing device over the network. The workload is encrypted with the workload encryption key. The workload server computing device decrypts the workload using the workload encryption key, and executes the decrypted workload for the workload client computing device.
    Type: Grant
    Filed: June 10, 2016
    Date of Patent: May 21, 2019
    Assignee: Lenovo Enterprise Solutions (Singapore) PTE. LTD.
    Inventors: Fred Allison Bower, III, Ajay Dholakia, Gregory B. Pruett, Christopher Landon Wood
  • Publication number: 20190025927
    Abstract: A computing device includes a processor and computer readable media storing program instructions executable by the processor to receive a user gesture through a first input device and obtain external data through a second input device. The program instructions are further executable by the processor to access a plurality of records, each record associating a control action with a combination of a user gesture definition and an external data criterion, and to identify, using the plurality of records, a control action that is associated with both a user gesture definition that is satisfied by the received user gesture and an external data criterion that is satisfied by the obtained external data. In addition, the program instructions are executable by a processor to execute the identified control action on the computing device.
    Type: Application
    Filed: July 24, 2017
    Publication date: January 24, 2019
    Inventors: Gary D. Cudak, Michael A. Perks, Srihari V. Angaluri, Ajay Dholakia
  • Patent number: 10185379
    Abstract: Systems and methods for usage of secondary power supplies in computing environments based on risk and cost assessments are disclosed. According to an aspect, a method includes determining a risk value to a primary power source of a need to utilize a secondary power source for powering a plurality of computing devices. The method includes using the secondary power source to power a portion of the computing devices based on the determined risk value.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: January 22, 2019
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Paul Artman, Fred A. Bower, Gary D. Cudak, Ajay Dholakia
  • Publication number: 20180373613
    Abstract: Systems and methods for dynamic user gesture creation are disclosed. According to an aspect, a method includes analyzing, by the processor, a set of inputs of a user into a computing device to achieve a result on the computing device. The method also includes determining, by the processor, whether an efficiency threshold is met if the user utilizes another input to achieve the result rather than the set of inputs. Further, the method includes presenting the other input to the user as an alternative input for achieving the result on the computing device in response to determining that the efficiency threshold is met.
    Type: Application
    Filed: June 24, 2017
    Publication date: December 27, 2018
    Inventors: Srihari Venkata Angaluri, Gary David Cudak, Ajay Dholakia, Michael Albert Perks
  • Patent number: 10114653
    Abstract: At power on of a computing device, a baseboard management controller (BMC) of the computing device executes, a first-stage bootloader program to download a second-stage bootloader program from a first server. The BMC executes the second-stage bootloader program to download third-stage firmware of the BMC from a second server. The BMC executes the third-stage firmware to download firmware of a primary processing subsystem of the computing device from a third server, and to start the primary processing subsystem by causing the primary processing subsystem to execute the firmware of the primary processing subsystem.
    Type: Grant
    Filed: June 9, 2016
    Date of Patent: October 30, 2018
    Assignee: Lenovo Enterprise Solutions (Singapore) PTE. LTD.
    Inventors: Fred Allison Bower, III, Ajay Dholakia, Scott Kelso, Gregory B. Pruett
  • Patent number: 10102041
    Abstract: A method includes tracking, for each of a plurality of workloads, a wear rate incurred by a component of a given component type as a result of processing an instance of the workload on a compute node that includes the component. The method further comprises determining a remaining lifespan for a plurality of components in a plurality of compute nodes, and identifying a component from among the plurality of components having a remaining lifespan of less than a first threshold amount. Sill further, the method comprises identifying an instance of one of the workloads that needs processing and has a wear rate greater than a second threshold amount, and processing the identified workload instance on the identified component.
    Type: Grant
    Filed: March 30, 2016
    Date of Patent: October 16, 2018
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Paul Artman, Gary D. Cudak, Fred A. Bower, III, Ajay Dholakia
  • Patent number: 10097571
    Abstract: A computer-implemented method includes receiving, by a computing device within a networking environment, a workload for execution within the networking environment; initiating, by the computing device, transfers of the workload to a plurality of network elements within the cloud networking environment; providing, by the computing device, tracking information of the workload as the workload traverses through the plurality of network elements; and storing or outputting, by the computing device, the tracking information regarding of the workload.
    Type: Grant
    Filed: March 23, 2016
    Date of Patent: October 9, 2018
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Fred Allison Bower, III, Gary David Cudak, Ajay Dholakia, William Gavin Holland, Scott Kelso