Patents by Inventor Deepak GHUGE
Deepak GHUGE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11782880Abstract: A computer-implemented method according to one embodiment includes compiling log data from all nodes of a cluster, retrieving a timestamp table stored within the cluster, optimizing the timestamp table, and adjusting the log data from all the nodes of a cluster, utilizing the timestamp table.Type: GrantFiled: January 4, 2019Date of Patent: October 10, 2023Assignee: International Business Machines CorporationInventors: Deepak Ghuge, Chetan R Kulkarni, Sandeep R. Patil
-
Patent number: 11521025Abstract: A computer-implemented method according to one embodiment includes analyzing an image stored on a device. In response to determining that a storage consumption of the device is greater than a first predetermined threshold, content of the image that is both non-focused and that is not of interest is selectively compressed. In response to determining that the storage consumption subsequent to selectively compressing content of the image that is both non-focused and that is not of interest, is greater than a second predetermined threshold, content of the image that is both focused and that is not of interest is selectively compressed. In response to determining that the storage consumption subsequent to selectively compressing content of the image that is both focused and that is not of interest, is greater than the second predetermined threshold, content of the image that is both focused and that is of interest is selectively compressed.Type: GrantFiled: December 21, 2020Date of Patent: December 6, 2022Assignee: International Business Machines CorporationInventors: Deepak Ghuge, Abhishek Jain, Subhojit Roy, Sasikanth Eda, Manojkiran Eda
-
Patent number: 11181975Abstract: A computer-implemented system and method for assigning security profiles comprises receiving bounded region information that is located within a defined region associated with a user from an augmented reality device (ARD) associated with the user. A bounded region is created from the bounded region information. A first set of selectable entities, such as subjects for whom the security profile is being applied and/or secure elements, such as cabinets, doors, or computer resources, are selected as those being within the bounded region information. A security profile to the first set of selectable entities is then applied relative to a second set of selectable entities.Type: GrantFiled: March 12, 2020Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Deepak Ghuge, Sasikanth Eda, Sarbajit K. Rakshit
-
Patent number: 11170269Abstract: A computer-implemented method according to one embodiment includes classifying an image stored on a device as a type of image. A user's access pattern of other images also classified as the type of image is analyzed. The method further includes analyzing at least one sharing medium that the user has previously used to share the image and/or other images. The analyzing the at least one medium is at least in part based on the classified type of the image. A previously recorded delete pattern of the user is analyzed. The analyzing the previously recorded delete pattern of the user is at least in part based on the classified type of the image. Based on the classified type of the image and/or based on results of the analyses, the image is categorized to one of a plurality of image compression categories. Each category corresponds to a degree of image compression.Type: GrantFiled: December 12, 2018Date of Patent: November 9, 2021Assignee: International Business Machines CorporationInventors: Deepak Ghuge, Abhishek Jain, Subhojit Roy, Sasikanth Eda, Manojkiran Eda
-
Publication number: 20210286425Abstract: A computer-implemented system and method for assigning security profiles comprises receiving bounded region information that is located within a defined region associated with a user from an augmented reality device (ARD) associated with the user. A bounded region is created from the bounded region information. A first set of selectable entities, such as subjects for whom the security profile is being applied and/or secure elements, such as cabinets, doors, or computer resources, are selected as those being within the bounded region information. A security profile to the first set of selectable entities is then applied relative to a second set of selectable entities.Type: ApplicationFiled: March 12, 2020Publication date: September 16, 2021Inventors: Deepak Ghuge, Sasikanth Eda, Sarbajit K. Rakshit
-
Patent number: 11048526Abstract: Embodiments for managing mobile electronic devices are described. At least one user-device interaction characteristic associated with a first mobile electronic device having a first set of hardware attributes is received. The operation of a second mobile electronic device having a second set of hardware attributes is tuned based on one or more of the at least one of the user-device interaction characteristics, a comparison of the first set of hardware attributes and the second set of hardware attributes, or a combination thereof.Type: GrantFiled: April 6, 2018Date of Patent: June 29, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rajan D. Mithani, Sasikanth Eda, Abhishek Jain, Deepak Ghuge, Manojkiran Eda
-
Publication number: 20210110214Abstract: A computer-implemented method according to one embodiment includes analyzing an image stored on a device. In response to determining that a storage consumption of the device is greater than a first predetermined threshold, content of the image that is both non-focused and that is not of interest is selectively compressed. In response to determining that the storage consumption subsequent to selectively compressing content of the image that is both non-focused and that is not of interest, is greater than a second predetermined threshold, content of the image that is both focused and that is not of interest is selectively compressed. In response to determining that the storage consumption subsequent to selectively compressing content of the image that is both focused and that is not of interest, is greater than the second predetermined threshold, content of the image that is both focused and that is of interest is selectively compressed.Type: ApplicationFiled: December 21, 2020Publication date: April 15, 2021Inventors: Deepak Ghuge, Abhishek Jain, Subhojit Roy, Sasikanth Eda, Manojkiran Eda
-
Patent number: 10936745Abstract: Methods and systems for encrypting data for a multi-tenant filesystem environment are provided. A system for encrypting data for a multitenant filesystem environment includes a file characteristics module that determines file characteristics for a file. The system also includes a user identification module that collects user identification information for one or more file operations, where a file operation in the one or more file operations is performed on a portion of the file. The system further includes a portion information module that gathers portion information about the portion of the file. Additionally, the system includes an encryption module that associates the portion information with a subtenancy encryption key in one or more subtenancy encryption keys based on the user identification information, where the one or more subtenancy encryption keys are associated with the file.Type: GrantFiled: July 20, 2018Date of Patent: March 2, 2021Assignee: International Business Machines CorporationInventors: Abhishek Jain, Anil Laxman Palled, Deepak Ghuge, Sasikanth Eda
-
Patent number: 10887464Abstract: Provided are a computer program product, system, and method for classifying a digital speech sample of a call to determine routing for the call. A digital speech sample of a call agent is processed to categorize speech as having an agent speech attribute. Information is received on a caller speech attribute initiating a call to the call center. The caller speech attribute results from categorizing a caller digital speech sample of the caller as having the caller speech attribute. A call agent of call agents having a call agent speech attribute that matches the caller speech attribute is selected and the call is routed to the selected call agent to process the call.Type: GrantFiled: February 5, 2019Date of Patent: January 5, 2021Assignee: International Business Machines CorporationInventors: Deepak Ghuge, Sasikanth Eda, Manojkiran Eda
-
Patent number: 10832728Abstract: Systems for location selection based on adjacent location errors are provided. One system includes a monitor module that monitors write numbers for one or more locations on a storage device, wherein a write number in the write numbers describes a number of times a storage device operation has been performed at a location in the one or more locations. Additionally, the system includes an identification module that identifies locations in one or more locations that are susceptible to adjacent location errors, wherein an adjacent location error is an error caused by a storage device operation associated with an adjacent location. Also, the system includes a selection module that selects a location in one or more locations for storing data based on monitored write numbers and identified locations.Type: GrantFiled: April 5, 2018Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Sasikanth Eda, Deepak Ghuge, Poornima Gupte, Sukumar Vankadhara
-
Patent number: 10831439Abstract: Embodiments are disclosed for reducing audio syndrome content. The techniques include generating a listener profile. The listener profile includes data associated with content that induces an audio syndrome for a listener. The techniques include determining that current content includes content that induces the audio syndrome for the listener. A trained audio syndrome predictor makes the determination based on the listener profile. The techniques include, in response to determining that the current content includes the content that induces the audio syndrome for the listener, generating an alternative audio content that suppresses audibility of the content that induces the audio syndrome for the listener. Additionally, the techniques include presenting the alternative audio content for the listener in place of the current content.Type: GrantFiled: July 16, 2019Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Sandeep Naik, Sasikanth Eda, Deepak Ghuge, Manojkiran Eda
-
Patent number: 10762203Abstract: Methods and systems for reducing the impact of malware/ransomware in a caching environment are provided. A system for reducing the impact of malware/ransomware includes a pattern detection module that identifies one or more file operations associated with one or more malicious patterns. Additionally, the one or more file operations act on data stored at a first data site. The system also includes an administration module that provides an alert to an administrator that one or more malicious patterns have been identified and determines an administration action in response to the alert. The system further includes a replication module that performs a replication action for the one or more file operations based on the administration action, wherein the replication action is performed in relation to replicated data stored at a second data site.Type: GrantFiled: August 27, 2018Date of Patent: September 1, 2020Assignee: International Business Machines CorporationInventors: Ashish Pandey, Deepak Ghuge, Sandeep Ramesh Patil
-
Publication number: 20200252510Abstract: Provided are a computer program product, system, and method for classifying a digital speech sample of a call to determine routing for the call. A digital speech sample of a call agent is processed to categorize speech as having an agent speech attribute. Information is received on a caller speech attribute initiating a call to the call center. The caller speech attribute results from categorizing a caller digital speech sample of the caller as having the caller speech attribute. A call agent of call agents having a call agent speech attribute that matches the caller speech attribute is selected and the call is routed to the selected call agent to process the call.Type: ApplicationFiled: February 5, 2019Publication date: August 6, 2020Inventors: Deepak Ghuge, Sasikanth Eda, Manojkiran Eda
-
Publication number: 20200218697Abstract: A computer-implemented method according to one embodiment includes compiling log data from all nodes of a cluster, retrieving a timestamp table stored within the cluster, optimizing the timestamp table, and adjusting the log data from all the nodes of a cluster, utilizing the timestamp table.Type: ApplicationFiled: January 4, 2019Publication date: July 9, 2020Inventors: Deepak Ghuge, Chetan R Kulkarni, Sandeep R. Patil
-
Publication number: 20200193238Abstract: A computer-implemented method according to one embodiment includes classifying an image stored on a device as a type of image. A user's access pattern of other images also classified as the type of image is analyzed. The method further includes analyzing at least one sharing medium that the user has previously used to share the image and/or other images. The analyzing the at least one medium is at least in part based on the classified type of the image. A previously recorded delete pattern of the user is analyzed. The analyzing the previously recorded delete pattern of the user is at least in part based on the classified type of the image. Based on the classified type of the image and/or based on results of the analyses, the image is categorized to one of a plurality of image compression categories. Each category corresponds to a degree of image compression.Type: ApplicationFiled: December 12, 2018Publication date: June 18, 2020Inventors: Deepak Ghuge, Abhishek Jain, Subhojit Roy, Sasikanth Eda, Manojkiran Eda
-
Patent number: 10576016Abstract: Embodiments for managing photographic capture by one or more processors are described. An image is received. The image includes at least one individual and is associated with a location. A signal indicative of a recommendation with respect to a posture of the at least one individual in the image is generated based on information associated with the at least one individual, the location, or a combination thereof.Type: GrantFiled: November 29, 2017Date of Patent: March 3, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sasikanth Eda, Deepak Ghuge, Abhishek Jain, Sandeep Patil
-
Publication number: 20200065485Abstract: Methods and systems for reducing the impact of malware/ransomware in a caching environment are provided. A system for reducing the impact of malware/ransomware includes a pattern detection module that identifies one or more file operations associated with one or more malicious patterns. Additionally, the one or more file operations act on data stored at a first data site. The system also includes an administration module that provides an alert to an administrator that one or more malicious patterns have been identified and determines an administration action in response to the alert. The system further includes a replication module that performs a replication action for the one or more file operations based on the administration action, wherein the replication action is performed in relation to replicated data stored at a second data site.Type: ApplicationFiled: August 27, 2018Publication date: February 27, 2020Inventors: Ashish Pandey, Deepak Ghuge, Sandeep Ramesh Patil
-
Publication number: 20200026873Abstract: Methods and systems for encrypting data for a multi-tenant filesystem environment are provided. A system for encrypting data for a multitenant filesystem environment includes a file characteristics module that determines file characteristics for a file. The system also includes a user identification module that collects user identification information for one or more file operations, where a file operation in the one or more file operations is performed on a portion of the file. The system further includes a portion information module that gathers portion information about the portion of the file. Additionally, the system includes an encryption module that associates the portion information with a subtenancy encryption key in one or more subtenancy encryption keys based on the user identification information, where the one or more subtenancy encryption keys are associated with the file.Type: ApplicationFiled: July 20, 2018Publication date: January 23, 2020Inventors: Abhishek Jain, Anil Laxman Palled, Deepak Ghuge, Sasikanth Eda
-
Publication number: 20190311742Abstract: Systems for location selection based on adjacent location errors are provided. One system includes a monitor module that monitors write numbers for one or more locations on a storage device, wherein a write number in the write numbers describes a number of times a storage device operation has been performed at a location in the one or more locations. Additionally, the system includes an identification module that identifies locations in one or more locations that are susceptible to adjacent location errors, wherein an adjacent location error is an error caused by a storage device operation associated with an adjacent location. Also, the system includes a selection module that selects a location in one or more locations for storing data based on monitored write numbers and identified locations.Type: ApplicationFiled: April 5, 2018Publication date: October 10, 2019Inventors: Sasikanth Eda, Deepak Ghuge, Poornima Gupte, Sukumar Vankadhara
-
Publication number: 20190310863Abstract: Embodiments for managing mobile electronic devices are described. At least one user-device interaction characteristic associated with a first mobile electronic device having a first set of hardware attributes is received. The operation of a second mobile electronic device having a second set of hardware attributes is tuned based on one or more of the at least one of the user-device interaction characteristics, a comparison of the first set of hardware attributes and the second set of hardware attributes, or a combination thereof.Type: ApplicationFiled: April 6, 2018Publication date: October 10, 2019Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rajan D. MITHANI, Sasikanth EDA, Abhishek JAIN, Deepak GHUGE, Manojkiran EDA