Patents by Inventor Badari Pulavarty
Badari Pulavarty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9892274Abstract: Methods, systems and computer program products are provided that may relate to controlling access to or accessing computer files over a computer network. A file server may execute on a first computer system and a client may execute on a second computer system. The client may be configured to send a first communication to the file server relating to a first computer file stored on the first computer system. The first communication may include first access control data associated with the first computer file. The file server may be configured to receive the first communication and extract the first access control data from the first communication. The file server may then store the extracted first access control data in extended attributes of the first computer file on the first computer system.Type: GrantFiled: November 26, 2014Date of Patent: February 13, 2018Assignee: International Business Machines CorporationInventors: Steven M. French, Venkateswararao Jujjuri, Anthony N. Liguori, Badari Pulavarty, Eric V. Van Hensbergen, Aneesh K. Veetil
-
Patent number: 9588752Abstract: Methods may perform unattended software installation. The method may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The method may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The method may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files. The method may additionally include storing the received answers, and providing the stored answers when requested during execution of the one or more user-selected software installation files.Type: GrantFiled: October 31, 2013Date of Patent: March 7, 2017Assignee: International Business Machines CorporationInventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N Sharoff
-
Patent number: 9575739Abstract: Systems and computer program products may perform unattended software installation. The systems and computer program products may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The systems and computer program products may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The systems and computer program products may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files.Type: GrantFiled: March 6, 2013Date of Patent: February 21, 2017Assignee: International Business Machines CorporationInventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N Sharoff
-
Patent number: 9251257Abstract: A digital file may be stored on a storage device and deleted upon reading of the file. In one example, at least a portion of the stored file may be read, such as by a processor. In response to the reading of the stored file, at least part of the at least a portion of the stored file that has been read may be deleted. In further examples, the at least part of the at least a portion of the stored file may be deleted progressively while the stored file is being read, after a triggering event, or after a delay in time. According to another example, a user may provide an indication representative of the at least part of the at least a portion of the stored file that is to be deleted after the at least a portion of the stored file is read.Type: GrantFiled: October 22, 2010Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventors: Alexander C Johnson, Badari Pulavarty
-
Patent number: 9111261Abstract: A method, system, and article for management of email communication content across a computer system network. An archive of email communications is retained on storage media in communication with the network. In addition, email communication is retained on storage media in communication with a client machine in the network. To mitigate duplication of email communications, duplicate communications are replaced with a hyperlink to the archive communication. This replacement supports removal of the duplicate communication from the storage media in communication with the client machine.Type: GrantFiled: April 23, 2010Date of Patent: August 18, 2015Assignee: International Business Machines CorporationInventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha Nageshrao Sharoff
-
Publication number: 20150088935Abstract: Methods, systems and computer program products are provided that may relate to controlling access to or accessing computer files over a computer network. A file server may execute on a first computer system and a client may execute on a second computer system. The client may be configured to send a first communication to the file server relating to a first computer file stored on the first computer system. The first communication may include first access control data associated with the first computer file. The file server may be configured to receive the first communication and extract the first access control data from the first communication. The file server may then store the extracted first access control data in extended attributes of the first computer file on the first computer system.Type: ApplicationFiled: November 26, 2014Publication date: March 26, 2015Inventors: Steven M. French, Venkateswararao Jujjuri, Anthony N. Liguori, Badari Pulavarty, Eric V. Van Hensbergen, Aneesh K. Veetil
-
Patent number: 8930401Abstract: Methods, systems and computer program products are provided that may relate to controlling access to or accessing computer files over a computer network. A file server may execute on a first computer system and a client may execute on a second computer system. The client may be configured to send a first communication to the file server relating to a first computer file stored on the first computer system. The first communication may include first access control data associated with the first computer file. The file server may be configured to receive the first communication and extract the first access control data from the first communication. The file server may then store the extracted first access control data in extended attributes of the first computer file on the first computer system.Type: GrantFiled: October 25, 2010Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Steven M. French, Venkateswararao Jujjuri, Anthony N. Liguori, Badari Pulavarty, Eric V. Van Hensbergen, Aneesh K. Veetil
-
Patent number: 8931054Abstract: A method may comprise storing first storage information in a storage device of a computer storage system on a first network. The computer storage system may transform the first storage information into a first virtual storage instance, provide access to the first virtual storage instance on a second network not in communication with the first network and the storage device, and enable over the second network the modification of the first virtual storage instance to create a first modified virtual storage instance. The computer storage system may also transform the first modified storage instance into first modified storage information based on the first modified storage instance, and store on the storage device the first modified storage information.Type: GrantFiled: February 28, 2013Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Khoa D Huynh, Rezaul S Islam, Badari Pulavarty
-
Patent number: 8918862Abstract: Embodiments of the invention relate to password management of one or more data storage devices. A set of passwords are employed to manage access to the storage devices, with authentication of both passwords enabling access to the subject storage device(s) for read and/or write operation privileges. The first password is known by the user and is used as an initial input string. The second password is not known by the user and is authenticated with the subject storage device(s) through BIOS and without input from the user.Type: GrantFiled: August 31, 2011Date of Patent: December 23, 2014Assignee: International Business Machines CorporationInventors: Sukadev Bhattiprolu, Jujjuri Venkateswararao, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha Nageshrao Sharoff
-
Publication number: 20140259009Abstract: Methods may perform unattended software installation. The method may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The method may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The method may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files. The method may additionally include storing the received answers, and providing the stored answers when requested during execution of the one or more user-selected software installation files.Type: ApplicationFiled: October 31, 2013Publication date: September 11, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N Sharoff
-
Publication number: 20140259008Abstract: Systems and computer program products may perform unattended software installation. The systems and computer program products may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. The systems and computer program products may additionally include extracting, from the read one or more software installation files, questions that a user will be asked to answer during execution of the one or more user-selected software installation files, and compiling the extracted questions. The systems and computer program products may further include prompting a user to provide answers to the compiled questions, and receiving answers to one or more questions of the compiled questions prior to execution of the one or more user-selected software installation files.Type: ApplicationFiled: March 6, 2013Publication date: September 11, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff
-
Publication number: 20140089557Abstract: A method for monitoring and managing virtual machine image storage in a virtualized computing environment is proposed, where the method for managing storage utilized by a virtual machine can include identifying one or more unused disk blocks in a guest virtual machine image, and removing the unused disk blocks from the guest virtual machine image.Type: ApplicationFiled: December 3, 2013Publication date: March 27, 2014Applicant: International Business Machines CorporationInventors: Sukadev Bhattiprolu, Mingming Cao, Venkateswararao Jujjuri, Haren Myneni, Malahal R Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha Sharoff
-
Publication number: 20140007189Abstract: A system for accessing stored information may comprise a first storage device for storing the information, a second storage device for storing an instance of the information, a first network providing communication between the first and second storage devices, and a second network providing access to the instance of the information but no access to the first network and the first storage device.Type: ApplicationFiled: June 28, 2012Publication date: January 2, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Khoa D. Huynh, Rezaul S. Islam, Badari Pulavarty
-
Patent number: 8509414Abstract: A target phone number previously associated with a first user is presently associated with a second user such that the target phone number is not presently associated with the first user. A caller uses a calling phone number to initiate a phone call to the target phone number. In response, it is determined whether the calling phone number is on a list of phone numbers associated with the first user. If the calling phone number is on the list of phone numbers associated with the first user, then the caller is notified that the target phone number is no longer associated with the first user. It is determined whether the caller wants to continue with the phone call, and if not, the phone call is terminated before it reaches the second user.Type: GrantFiled: September 1, 2008Date of Patent: August 13, 2013Assignee: International Business Machines CorporationInventors: Sukadev Bhattiprolu, Haren Myneni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff, Malahal R. Naineni
-
Publication number: 20130151888Abstract: A technique for avoiding a ping-pong effect on active-passive paths in a storage system managing one or more logical storage units (LUNs) on behalf of one or more host systems. A first path to the LUNs is designated as an active path and a second path to the LUNs is designated as a passive path. The first path is also designated as a preferred path to the LUNs. In response to a path failure in which a host system cannot access the LUNs on the first path, a failover operation is implemented wherein the second path is designated as the active path and the first path is designated as the passive path. The designation of the first path as the preferred path to the LUNs is not changed. Subsequent failback operations are conditionally inhibited so that only the failover host that initiated the failover is permitted to initiate a failback.Type: ApplicationFiled: December 12, 2011Publication date: June 13, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra S. Seetharaman, Narasimha N. Sharoff
-
Publication number: 20130054868Abstract: Method, system and computer program product for monitoring and managing virtual machine image storage in a virtualized computing environment, where the method for managing storage utilized by a virtual machine can include identifying one or more unused disk blocks in a guest virtual machine image, and removing the unused disk blocks from the guest virtual machine image.Type: ApplicationFiled: August 23, 2011Publication date: February 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sukadev Bhattiprolu, Mingming Cao, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha Sharoff
-
Publication number: 20130055382Abstract: Embodiments of the invention relate to password management of one or more data storage devices. A set of passwords are employed to manage access to the storage devices, with authentication of both passwords enabling access to the subject storage device(s) for read and/or write operation privileges. The first password is known by the user and is used as an initial input string. The second password is not known by the user and is authenticated with the subject storage device(s) through BIOS and without input from the user.Type: ApplicationFiled: August 31, 2011Publication date: February 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sukadev Bhattiprolu, Jujjuri Venkateswararao, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha Nageshrao Sharoff
-
Publication number: 20130055108Abstract: Embodiments of the invention relate to an on-line communication tool. A set of windows are employed to manage threads of communication. A first window maintains a list of threads available for discussion during the communication. A second window maintains a continuous log of the communication, and functions in a read-only mode. A third window maintains a read-write channel for a thread of the communication, and functions in a read-write mode. One or more threads may be selected from the first window, with each thread selection opening a separate third window. Text pertaining to a specific thread of the communication may be entered into the specific third window and populated to the continuous log of the second window.Type: ApplicationFiled: August 31, 2011Publication date: February 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sukadev Bhattiprolu, Jujjuri Venkateswarara, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha Nageshrao Sharoff
-
Patent number: 8364995Abstract: Managing delivery of power to one or more hardware memory devices in a computer system. The computer system is configured with a processor and at least two hardware memory devices. A temperature monitor tool is employed to monitor the hardware memory devices. Management of an addressable subset of the hardware memory devices is employed in response to the monitored temperature reading.Type: GrantFiled: April 30, 2012Date of Patent: January 29, 2013Assignee: International Business Machines CorporationInventors: Gerrit Huizenga, Vivek Kashyap, Badari Pulavarty, Russell H. Weight
-
Publication number: 20120323481Abstract: In a method for selecting a parking lot exit, a computer receives geographic coordinates of a first parking exit of a parking facility. The computer receives geographic coordinates of a second parking exit of the parking facility. The computer determines a first route from the first parking exit to a destination, using the geographic coordinates of the first parking exit. The computer determines a second route from the second parking exit to the destination, using the geographic coordinates of the second parking exit. The computer selects one of the first parking exit and the second parking exit based on the first route and the second route.Type: ApplicationFiled: June 20, 2011Publication date: December 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sukadev Bhattiprolu, Venkateswararao Jujjuri, Haren Myneni, Malahal R. Naineni, Badari Pulavarty, Chandra Seetharaman, Narasimha N. Sharoff