Patents by Inventor Anupam Pandey
Anupam Pandey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220086025Abstract: A virtual network comprising virtual machines executing at a computing environment is implemented. A floating network interface is attached to a software defined networking (SDN) appliance. The floating network interface is configured to provide a connection to computing resources via a virtual network of a virtual computing environment, and the floating network interface is attachable to and detachable from the SDN appliance. The SDN appliance is configured to apply policies of the virtual computing environment to data traffic on the virtual network.Type: ApplicationFiled: December 1, 2020Publication date: March 17, 2022Inventors: Rishabh TEWARI, Sumit Sharad DHOBLE, James Allen GRANTHAM, Avijit GUPTA, Daniel Max FIRESTONE, Deepak BANSAL, Manasi DEVAL, Anupam PANDEY, Gabriel SILVA, Narayan ANNAMALAI, Madhan SIVAKUMAR, Ezzeldin HAMED, David Aaron MALTZ
-
Patent number: 10819677Abstract: Techniques for address migration are described. An address migration service can receive a request to migrate an address space to a provider network, the request including at least one range of addresses. The AMS service can authorize the request with an internet registry and provision the address space in at least one area of the provider network. The AMS can receive a request to advertise the address space, advertise the address space, and allocate at least one address in the address space to at least one resource in the provider network.Type: GrantFiled: July 16, 2018Date of Patent: October 27, 2020Assignee: Amazon Technologies, Inc.Inventors: Jason Goelitz, Leonid Nikolayev, Daniel Ralph Paquette, Anupam Pandey
-
Publication number: 20200021556Abstract: Techniques for address migration are described. An address migration service can receive a request to migrate an address space to a provider network, the request including at least one range of addresses. The AMS service can authorize the request with an internet registry and provision the address space in at least one area of the provider network. The AMS can receive a request to advertise the address space, advertise the address space, and allocate at least one address in the address space to at least one resource in the provider network.Type: ApplicationFiled: July 16, 2018Publication date: January 16, 2020Inventors: Jason GOELITZ, Leonid NIKOLAYEV, Daniel Ralph PAQUETTE, Anupam PANDEY
-
Patent number: 10205729Abstract: A method for providing multiple users with security access to an electronic system is provided. The method comprising: providing a plurality of parent security roles, wherein each parent security role includes a plurality of transactions authorized to be performed in the electronic system, providing a plurality of child security roles, wherein each child security role is derived from one of the plurality of parent security roles, setting up the multiple users in the electronic system and their associated user passwords, assigning one of the plurality of child security roles to each of the multiple users to provide the multiple users with security access to the electronic system at once, and providing each of the multiple users with security access to the electronic system, via the associated user password, in accordance with the child security role assigned to the user.Type: GrantFiled: September 18, 2015Date of Patent: February 12, 2019Assignee: ACCENTURE GLOBAL SERVICES LIMITEDInventors: Sachin Saraf, Anupam Pandey
-
Publication number: 20180082228Abstract: A device may receive requests for a set of project management office (PMO) services that are hosted by a set of enterprise project management (EPM) systems. The requests may include a first request and the first request includes a PMO service identifier. The device may analyze a set of configuration files to identify a configuration file associated with a PMO service of the set of PMO services that is associated with the first request. The configuration file may be associated with the PMO service identifier. The device may execute navigation instructions included in the configuration file to obtain, modify, or create PMO service data by interacting with a server device that hosts the PMO service. The device may perform, using the PMO service data and one or more configuration parameters included in the configuration file, one or more actions associated with delivering the PMO service.Type: ApplicationFiled: August 24, 2017Publication date: March 22, 2018Inventors: Anupam PANDEY, Sachin KALGUDE
-
Patent number: 9712388Abstract: A cloud configuration management method implemented in a cloud configuration management system communicatively coupled to one or more cloud nodes in a cloud system includes creating a plurality of golden configurations for each of a plurality of roles, wherein each of the one or more cloud nodes has one of the plurality of roles for operation in the cloud system; defining metadata rules for each of the plurality of golden configurations; performing a configuration analysis to audit the one or more cloud nodes using the metadata rules; and providing results of the configuration analysis to determine misconfiguration of any of the one or more cloud nodes.Type: GrantFiled: August 12, 2016Date of Patent: July 18, 2017Assignee: Zscaler, Inc.Inventors: Rajnish Mishra, Anupam Pandey, Sachin Kumar, Jaspreet Singh, Anshul Behl, Kaleeswaran Karuppasamy
-
Publication number: 20160352572Abstract: A cloud configuration management method implemented in a cloud configuration management system communicatively coupled to one or more cloud nodes in a cloud system includes creating a plurality of golden configurations for each of a plurality of roles, wherein each of the one or more cloud nodes has one of the plurality of roles for operation in the cloud system; defining metadata rules for each of the plurality of golden configurations; performing a configuration analysis to audit the one or more cloud nodes using the metadata rules; and providing results of the configuration analysis to determine misconfiguration of any of the one or more cloud nodes.Type: ApplicationFiled: August 12, 2016Publication date: December 1, 2016Applicant: Zscaler, Inc.Inventors: Rajnish MISHRA, Anupam PANDEY, Sachin KUMAR, Jaspreet SINGH, Anshul BEHL, Kaleeswaran KARUPPASAMY
-
Patent number: 9444685Abstract: A cloud configuration management method implemented in a cloud configuration management system communicatively coupled to one or more cloud nodes in a cloud system includes creating a plurality of golden configurations for each of a plurality of roles, wherein each of the one or more cloud nodes has one of the plurality of roles for operation in the cloud system; defining metadata rules for each of the plurality of golden configurations; performing a configuration analysis to audit the one or more cloud nodes using the metadata rules; and providing results of the configuration analysis to determine misconfiguration of any of the one or more cloud nodes.Type: GrantFiled: September 16, 2014Date of Patent: September 13, 2016Assignee: Zscaler, Inc.Inventors: Rajnish Mishra, Anupam Pandey, Sachin Kumar, Jaspreet Singh, Anshul Behl, Kaleeswaran Karuppasamy
-
Publication number: 20160080204Abstract: A cloud configuration management method implemented in a cloud configuration management system communicatively coupled to one or more cloud nodes in a cloud system includes creating a plurality of golden configurations for each of a plurality of roles, wherein each of the one or more cloud nodes has one of the plurality of roles for operation in the cloud system; defining metadata rules for each of the plurality of golden configurations; performing a configuration analysis to audit the one or more cloud nodes using the metadata rules; and providing results of the configuration analysis to determine misconfiguration of any of the one or more cloud nodes.Type: ApplicationFiled: September 16, 2014Publication date: March 17, 2016Applicant: Zscaler, Inc.Inventors: Rajnish MISHRA, Anupam PANDEY, Sachin KUMAR, Jaspreet SINGH, Anshul BEHL, Kaleeswaran KARUPPASAMY
-
Publication number: 20160014139Abstract: A method for providing multiple users with security access to an electronic system is provided. The method comprising: providing a plurality of parent security roles, wherein each parent security role includes a plurality of transactions authorized to be performed in the electronic system, providing a plurality of child security roles, wherein each child security role is derived from one of the plurality of parent security roles, setting up the multiple users in the electronic system and their associated user passwords, assigning one of the plurality of child security roles to each of the multiple users to provide the multiple users with security access to the electronic system at once, and providing each of the multiple users with security access to the electronic system, via the associated user password, in accordance with the child security role assigned to the user.Type: ApplicationFiled: September 18, 2015Publication date: January 14, 2016Applicant: ACCENTURE GLOBAL SERVICES LIMITEDInventors: Sachin SARAF, Anupam PANDEY
-
Patent number: 9152802Abstract: A method for providing multiple users with security access to an electronic system is provided. The method comprising: providing a plurality of parent security roles, wherein each parent security role includes a plurality of transactions authorized to be performed in the electronic system, providing a plurality of child security roles, wherein each child security role is derived from one of the plurality of parent security roles, setting up the multiple users in the electronic system and their associated user passwords, assigning one of the plurality of child security roles to each of the multiple users to provide the multiple users with security access to the electronic system at once, and providing each of the multiple users with security access to the electronic system, via the associated user password, in accordance with the child security role assigned to the user.Type: GrantFiled: February 7, 2008Date of Patent: October 6, 2015Assignee: ACCENTURE GLOBAL SERVICES LIMITEDInventors: Sachin Saraf, Anupam Pandey
-
Patent number: 7945905Abstract: A data processing system, method, and instructions executable on a computer inspect the quality of software code. A summary report is generated that summarizes aspects of the current status of a software project. The summary report may include which portions of code have been written, which have been edited to predetermined standards, and which remain to be written. Errors in the code may be identified. Warnings associated with portions of the code may be generated, as well as suggested changes to the code. For comparison, the suggested code changes may be displayed along side of the corresponding portions of the pre-existing code that the suggested code is intended to replace. Hard coded values may be automatically identified. Text elements corresponding to each hard coded value may be automatically created. Subsequently, each hard coded value may be automatically replaced by the corresponding text element. Revisions to pre-existing code may be inspected.Type: GrantFiled: June 2, 2006Date of Patent: May 17, 2011Assignee: Accenture Global Services LimitedInventors: Abhishek Kumar, Harish Easwaran, Ashok D. Pithdaiya, Anupam Pandey
-
Publication number: 20090216628Abstract: Project assessment is initiated with receipt of project specification data that is descriptive, among other things, of at least one skill set or domain applied to the project. Based on the project specification data, one or more questionnaires, each corresponding to one of the identified skill sets, are automatically selected. Each of the selected questionnaires comprises questions concerning best practices applicable to the corresponding one skill set. The identified questionnaires are provided to a user and, in turn, assessment data is received in response to the one or more questionnaires. Based on the assessment data, an overall project score and other scores can be determined and presented. The at least one skill set may identify specific technologies being applied to the project. Because the questions presented in the at least one questionnaire require standardized answers, results from among a plurality of reviewers may be compared more readily.Type: ApplicationFiled: February 10, 2009Publication date: August 27, 2009Applicant: ACCENTURE GLOBAL SERVICES GmbHInventors: Anil Kumar Pandey, Anupam Pandey
-
Publication number: 20090183244Abstract: A method for providing multiple users with security access to an electronic system is provided. The method comprising: providing a plurality of parent security roles, wherein each parent security role includes a plurality of transactions authorized to be performed in the electronic system, providing a plurality of child security roles, wherein each child security role is derived from one of the plurality of parent security roles, setting up the multiple users in the electronic system and their associated user passwords, assigning one of the plurality of child security roles to each of the multiple users to provide the multiple users with security access to the electronic system at once, and providing each of the multiple users with security access to the electronic system, via the associated user password, in accordance with the child security role assigned to the user.Type: ApplicationFiled: February 7, 2008Publication date: July 16, 2009Inventors: Sachin Saraf, Anupam Pandey
-
Publication number: 20070283325Abstract: A data processing system, method, and instructions executable on a computer inspect the quality of software code. A summary report is generated that summarizes aspects of the current status of a software project. The summary report may include which portions of code have been written, which have been edited to predetermined standards, and which remain to be written. Errors in the code may be identified. Warnings associated with portions of the code may be generated, as well as suggested changes to the code. For comparison, the suggested code changes may be displayed along side of the corresponding portions of the pre-existing code that the suggested code is intended to replace. Hard coded values may be automatically identified. Text elements corresponding to each hard coded value may be automatically created. Subsequently, each hard coded value may be automatically replaced by the corresponding text element. Revisions to pre-existing code may be inspected.Type: ApplicationFiled: June 2, 2006Publication date: December 6, 2007Inventors: Abhishek Kumar, Harish Easwaran, Ashok D. Pithdaiya, Anupam Pandey