Patents by Inventor Bhaskar Singhal
Bhaskar Singhal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12237086Abstract: Non-communicable diseases (NCDs) are the pandemics of modern era and are generating huge impact in the modern society. Conventional methods are inaccurate due to a challenge in handling data from heterogenous sensors. The present disclosure is capable of tracking fitness parameters of a user even with heterogenous sensors. Initially, the system receives a raw data from a plurality of heterogenous sensors associated with the user. The raw data is further transformed into a metadata format associated with the corresponding sensor. The transformed data is temporally aligned based on a time based slotting. An algorithm pipeline corresponding to a disorder to be analyzed is selected from a Directed Acyclic Graph (DAG) based on a sensor metadata and a plurality of algorithm metadata corresponding to a plurality of algorithms stored in an algorithm database and an algorithm pipeline. The corresponding disorder is analyzed using the algorithm pipeline.Type: GrantFiled: March 2, 2022Date of Patent: February 25, 2025Assignee: TATA CONSULTANCY SERVICES LIMITEDInventors: Avik Ghose, Avijit Samal, Nasimuddin Ahmed, Shivam Singhal, Karan Bhavsar, Vivek Chandel, Sundeep Khandelwal, Harsh Vishwakarma, Bhaskar Pawar
-
Publication number: 20250046602Abstract: A method includes obtaining a base structure of an electronic device, the base structure including at least one opening, and forming, using a reactive-ion deposition process, a dielectric material within the at least one opening.Type: ApplicationFiled: August 3, 2023Publication date: February 6, 2025Inventors: Bhaskar Jyoti Bhuyan, Mark J. Saly, Lakmal Charidu Kalutarage, Feng Q. Liu, Jeffrey W. Anthis, Abhijit Basu Mallick, Akhil Singhal
-
Patent number: 10855791Abstract: A request that indicates a component that can be quiesced is received at a first node. It is determined that quiescence of the component might impact an endpoint. A request for identification of at least one path between a second node and the endpoint is sent to the second node. It is determined, based on a response received from the second node, whether the endpoint will be accessible to the second node if the component is quiesced. In response to a determination that the endpoint will be accessible to the second node if the component is quiesced, a positive analysis outcome is indicated. In response to a determination that the endpoint will not be accessible to the second node if the component is quiesced, a negative analysis outcome is indicated.Type: GrantFiled: November 25, 2014Date of Patent: December 1, 2020Assignee: NetApp, Inc.Inventors: Gunalan Perumal Vijayan, William D. Dallas, Sridhar Balachandriah, Bhaskar Singhal
-
Patent number: 10244050Abstract: A request to change one or more storage characteristics associated with a virtual storage device is received. Communications identifying the virtual storage device are routed, via a network, to a first storage endpoint. One or more operations are performed in accordance with the request. A configuration of the network is updated to route communications identifying the virtual storage device to a second storage endpoint.Type: GrantFiled: July 21, 2015Date of Patent: March 26, 2019Assignee: NetApp, Inc.Inventors: Ameya Prakash Usgaonkar, Ramana Reddy, Bhaskar Singhal
-
Publication number: 20170026469Abstract: A request to change one or more storage characteristics associated with a virtual storage device is received. Communications identifying the virtual storage device are routed, via a network, to a first storage endpoint. One or more operations are performed in accordance with the request. A configuration of the network is updated to route communications identifying the virtual storage device to a second storage endpoint.Type: ApplicationFiled: July 21, 2015Publication date: January 26, 2017Inventors: Ameya Prakash Usgaonkar, Ramana Reddy, Bhaskar Singhal
-
Publication number: 20160269501Abstract: Technology is disclosed for using a cache cluster of a cloud computing service (“cloud”) as a victim cache for a data storage appliance (“appliance”) implemented in the cloud. The cloud includes a cache cluster that acts as a primary cache for caching data of various services implemented in the cloud. By using the cache cluster as a victim cache for the appliance, the read throughput of the appliance is improved. The data blocks evicted from a primary cache of the appliance are stored in the cache cluster. These evicted data blocks are likely to be requested again, so storing them in the cache cluster can increase performance, e.g., input-output (I/O) throughput of the appliance. A read request for data can be serviced by retrieving the data from the cache cluster instead of a persistent storage medium of the appliance, which has higher read latency than the cache cluster.Type: ApplicationFiled: March 11, 2015Publication date: September 15, 2016Inventors: Ameya Prakash Usgaonkar, Bhaskar Singhal
-
Patent number: 9354821Abstract: A storage controller receives data from a host. The data is provided to a storage stack on the storage controller. The storage stack can perform deduplication, compression or file layout operations on the data, which is then written to a first storage unit coupled to a first port of the storage controller. The storage controller determines whether a second port of the first storage controller is configured as a remote port. In response to determining that the second port is configured as a remote port, the data is also provided to a pass-thru stack on the first storage controller. The pass-thru stack performs protocol conversion on the data and writes the data to the second port on the storage controller.Type: GrantFiled: May 20, 2014Date of Patent: May 31, 2016Assignee: NetApp, Inc.Inventors: Edward Barron, Amarnath Jolad, Bhaskar Singhal
-
Publication number: 20160149828Abstract: A request that indicates a component that can be quiesced is received at a first node. It is determined that quiescence of the component might impact an endpoint. A request for identification of at least one path between a second node and the endpoint is sent to the second node. It is determined, based on a response received from the second node, whether the endpoint will be accessible to the second node if the component is quiesced. In response to a determination that the endpoint will be accessible to the second node if the component is quiesced, a positive analysis outcome is indicated. In response to a determination that the endpoint will not be accessible to the second node if the component is quiesced, a negative analysis outcome is indicated.Type: ApplicationFiled: November 25, 2014Publication date: May 26, 2016Inventors: Gunalan Perumal Vijayan, William D. Dallas, Sridhar Balachandriah, Bhaskar Singhal
-
Publication number: 20160098331Abstract: A method, non-transitory computer readable medium and host computing device that stores, by a first virtual storage controller, a plurality of received transactions in a transaction log in an in-memory storage device. The first virtual storage controller is monitored and a determination is made when a failure of the first virtual storage controller has occurred based on the monitoring. When the failure of the first virtual storage controller is determined to have occurred, at least one storage volume previously assigned to the first virtual storage controller is remapped to be assigned to a second virtual storage controller. Additionally, the second virtual storage controller retrieves at least one of the transactions from the transaction log in the in-memory storage device and replays at least one of the transactions.Type: ApplicationFiled: October 7, 2014Publication date: April 7, 2016Inventors: Deepti Banka, Ameya Prakash Usgaonkar, Bhaskar Singhal
-
Publication number: 20150339080Abstract: A storage controller receives data from a host. The data is provided to a storage stack on the storage controller. The storage stack can perform deduplication, compression or file layout operations on the data, which is then written to a first storage unit coupled to a first port of the storage controller. The storage controller determines whether a second port of the first storage controller is configured as a remote port. In response to determining that the second port is configured as a remote port, the data is also provided to a pass-thru stack on the first storage controller. The pass-thru stack performs protocol conversion on the data and writes the data to the second port on the storage controller.Type: ApplicationFiled: May 20, 2014Publication date: November 26, 2015Applicant: NetApp, Inc.Inventors: Edward Barron, Amarnath Jolad, Bhaskar Singhal
-
Patent number: 8468385Abstract: Method and system for managing error related events while a system is processing input/output (“I/O”) requests for accessing storage space is provided. Various components are involved in processing the I/O requests. Some of these components may also have sub-components. Events related to the various components are classified with respect to their severity levels. Threshold values for a frequency of these events is set and stored in a data structure at a memory location. When an event occurs, the severity level and the threshold value for the event are determined from the data structure. The actual frequency is then compared to the stored threshold value. If the threshold value is violated and there is an alternate path to route the I/O request, then the affected component is restricted and the alternate path is used to route the I/O request.Type: GrantFiled: October 27, 2010Date of Patent: June 18, 2013Assignee: Netapp, Inc.Inventors: Sridhar Balachandriah, Bhaskar Singhal