Patents by Inventor Deepak R. GHUGE
Deepak R. GHUGE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9659282Abstract: The method includes identifying a location of an individual and an amount of time the individual will be in the location. The method further includes identifying one or more contacts of the individual that are within a threshold distance of the identified location of the individual during the identified amount time the individual will be in the location. The method further includes generating a first visitation schedule and corresponding visitation route for the individual based upon the identified status for the one or more contacts of the individual based upon social media activity, the identified frequency of interaction between the individual and the identified one or more contacts of the individual, and the determined distances from the individual to the identified one or more contacts and between each of the identified one or more contacts.Type: GrantFiled: February 17, 2016Date of Patent: May 23, 2017Assignee: International Business Machines CorpoationInventors: Sasikanth Eda, Deepak R. Ghuge, John G. Musial, Sandeep R. Patil, Gandhi Sivakumar
-
Publication number: 20170132090Abstract: Embodiments of the present invention provide a method, computer program product, and computer system for leveraging checkpoint restart. The method includes determining a first set of work stages within a first computation algorithm. A set of permissions associated with the first set of work stages are identified, and the work stages are stored as checkpoints in either a public location or a private location. Upon deployment of a second computation algorithm, a second set of work stages within the second computation algorithm is compared to the first set of work stages. If the second set of work stages match with the first set of work stages, the second computation algorithm is executed using the checkpoint associated with the matching work stages.Type: ApplicationFiled: July 14, 2016Publication date: May 11, 2017Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
-
Publication number: 20170131923Abstract: Embodiments of the present invention provide a method, computer program product, and computer system for leveraging checkpoint restart. The method includes determining a first set of work stages within a first computation algorithm. A set of permissions associated with the first set of work stages are identified, and the work stages are stored as checkpoints in either a public location or a private location. Upon deployment of a second computation algorithm, a second set of work stages within the second computation algorithm is compared to the first set of work stages. If the second set of work stages match with the first set of work stages, the second computation algorithm is executed using the checkpoint associated with the matching work stages.Type: ApplicationFiled: November 5, 2015Publication date: May 11, 2017Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
-
Publication number: 20170116675Abstract: A method is provided to use a weighted model for determining a term insurance premium based on each operation performed by a user in a software defined infrastructure. For each operation performed by the user, the operation is classified and weighted against its results, and risk associated with the results is analyzed. A term insurance amount is calculated based on the risk for recovery, and expertise of IT resource vendor. An end user is equipped with flexibility of enabling insurance for a particular software operation.Type: ApplicationFiled: October 27, 2015Publication date: April 27, 2017Inventors: Sasikanth Eda, Deepak R. Ghuge, Varun Mittal, Sandeep R. Patil, Gandhi Sivakumar
-
Publication number: 20170054796Abstract: According to one exemplary embodiment, a method for embedded compute engine architecture optimization is provided. The method may include receiving an object. The method may also include determining a first category for the received object, whereby the determined first category is associated with a node. The method may then include storing the received object on the node associated with the determined first category. The method may further include receiving an algorithm. The method may also include determining a second category for the received algorithm, whereby the determined second category is associated with the node. The method may then include executing the received algorithm on the node, whereby the received algorithm uses the received object stored on the node.Type: ApplicationFiled: August 19, 2015Publication date: February 23, 2017Inventors: Sasikanth Eda, Deepak R. Ghuge, Kaustubh I. Katruwar, Sandeep R. Patil
-
Publication number: 20170032008Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.Type: ApplicationFiled: October 14, 2016Publication date: February 2, 2017Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lawrence C. BLOUNT, Deepak R. GHUGE, Shah Mohammad R. ISLAM, Sandeep R. PATIL, Riyazahamad M. SHIRAGUPPI, Renu TEWARI
-
Publication number: 20160366217Abstract: An efficient cloning mechanism is provided for a distributed storage environment, where, for example, a private cloud computing environment and a public cloud computing environment are included in a hybrid cloud computing environment (on-premise object storage to off-premise computation resources), to improve computation workloads. The disclosed algorithm forms an efficient cloning mechanism in a hybrid storage environment where the read/write speed of data from the disk is not limited by its angular velocity.Type: ApplicationFiled: June 12, 2015Publication date: December 15, 2016Inventors: Sasikanth Eda, Deepak R. Ghuge, Yu-Cheng Hsu, Sandeep R. Patil
-
Patent number: 9501493Abstract: A method for adjusting roles of nodes in a distributed clustered file system can include receiving a first computation operation and profiling the first computation operation according to one or more metrics. The method can also include determining, based on the profiling of the first computation operation, a first file system attribute of the first computation operation. The method can also include identifying that the first computation operation serves a first file system role and identifying a first hardware characteristic of hardware on which a first node of a plurality of nodes is hosted. The method can also include receiving an identification that the first node can utilize additional computation of the first file system role and instantiating a virtualization unit on the first node.Type: GrantFiled: December 4, 2015Date of Patent: November 22, 2016Assignee: International Business Machines CorporationInventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
-
Patent number: 9451083Abstract: Embodiments of the present invention may relate generally to the field of computing, and more particularly to estimating an answering time by a user of a communication on a communication device. A user may receive a communication on a first communication device from a second communication device. A distance of the user from the first communication device may be determined. A time may be estimated for the user to reach the first communication device based on the distance determination. The time estimation may be communicated to the second communication device.Type: GrantFiled: August 3, 2015Date of Patent: September 20, 2016Assignee: International Business Machines CorporationInventors: Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil, Gandhi Sivakumar
-
Publication number: 20160180297Abstract: The method includes identifying a location of an individual and an amount of time the individual will be in the location. The method further includes identifying one or more contacts of the individual that are within a threshold distance of the identified location of the individual during the identified amount time the individual will be in the location. The method further includes generating a first visitation schedule and corresponding visitation route for the individual based upon the identified status for the one or more contacts of the individual based upon social media activity, the identified frequency of interaction between the individual and the identified one or more contacts of the individual, and the determined distances from the individual to the identified one or more contacts and between each of the identified one or more contacts.Type: ApplicationFiled: February 17, 2016Publication date: June 23, 2016Inventors: Sasikanth Eda, Deepak R. Ghuge, John G. Musial, Sandeep R. Patil, Gandhi Sivakumar
-
Publication number: 20160132276Abstract: In an approach for determining printability of an electronic file, a computer electronically receives a file for printing. The computer parses the file for one or more of text, images, and formatting indicative of potential copyrighted material. The computer, in response to identifying any text, images, or formatting indicative of potential copyrighted material, identifies potential copyrighted material within the file. The computer determines whether the file may be printed based, at least in part, on the identified potential copyrighted material. In another approach for determining printability of an electronic document, a computer electronically receives a document for printing. The computer locates attributes associated with the document and stored in a separate database, which includes one or more of the following: ownership, licensing information, printability, and number of prints allowed. The computer determines the document is printable based on the attributes and prints the document.Type: ApplicationFiled: November 12, 2014Publication date: May 12, 2016Inventors: Sasikanth Eda, Deepak R. Ghuge, Sridhar Puvvala, Riyazahamad M. Shiraguppi
-
Publication number: 20160132897Abstract: In an approach for determining printability of an electronic file, a computer electronically receives a file for printing. The computer parses the file for one or more of text, images, and formatting indicative of potential copyrighted material. The computer, in response to identifying any text, images, or formatting indicative of potential copyrighted material, identifies potential copyrighted material within the file. The computer determines whether the file may be printed based, at least in part, on the identified potential copyrighted material. In another approach for determining printability of an electronic document, a computer electronically receives a document for printing. The computer locates attributes associated with the document and stored in a separate database, which includes one or more of the following: ownership, licensing information, printability, and number of prints allowed. The computer determines the document is printable based on the attributes and prints the document.Type: ApplicationFiled: April 15, 2015Publication date: May 12, 2016Inventors: Sasikanth Eda, Deepak R. Ghuge, Sridhar Puvvala, Riyazahamad M. Shiraguppi
-
Patent number: 9325800Abstract: The method includes identifying a location of an individual and an amount of time the individual will be in the location. The method further includes identifying one or more contacts of the individual that are within a threshold distance of the identified location of the individual during the identified amount time the individual will be in the location. The method further includes generating a first visitation schedule and corresponding visitation route for the individual based upon the identified status for the one or more contacts of the individual based upon social media activity, the identified frequency of interaction between the individual and the identified one or more contacts of the individual, and the determined distances from the individual to the identified one or more contacts and between each of the identified one or more contacts.Type: GrantFiled: December 18, 2014Date of Patent: April 26, 2016Assignee: International Business Machines CorporationInventors: Sasikanth Eda, Deepak R. Ghuge, John G. Musial, Sandeep R. Patil, Gandhi Sivakumar
-
Patent number: 9298385Abstract: A method for ensuring compliance of service levels corresponding to file-system operations in a deduplicated, tiered storage system comprising storage devices of varying performance levels, each of the performance levels being associated with at least one service level, includes performing a deduplication remapping operation so that a data item corresponding to a higher service level, is stored as an original on a higher performance storage tier while duplicates of the data item corresponding to a lower service level exist in lower performance storage tier at least in part as pointers to the data item on the higher performance storage tier.Type: GrantFiled: April 12, 2013Date of Patent: March 29, 2016Assignee: International Business Machines CorporationInventors: Duane M. Baldwin, Sasikanth Eda, Deepak R. Ghuge, John T. Olson, Sandeep R. Patil
-
Patent number: 9113135Abstract: A mechanism is provided for identifying one or more eligible image candidates. Responsive to a determination that the storage of a recently captured image raising an allocated captured images memory space in a storage to a point that storage of a next captured image would raise the allocated captured images memory space in the storage above the predetermined threshold, a criteria group in a set of criteria groups is identified to utilize for identification of one or more images candidates from a set of stored images in the storage. The one or more images candidates from the set of stored images in the storage are identified utilizing one or more image identification criteria in the criteria group. The one or more image candidates are then presented to a user.Type: GrantFiled: February 19, 2015Date of Patent: August 18, 2015Assignee: International Business Machines CorporationInventors: Deepak R. Ghuge, Dilipkumar S. Jha, Sandeep R. Patil, Eda Sasikanth
-
Publication number: 20150163449Abstract: A mechanism is provided for identifying one or more eligible image candidates. Responsive to a determination that the storage of a recently captured image raising an allocated captured images memory space in a storage to a point that storage of a next captured image would raise the allocated captured images memory space in the storage above the predetermined threshold, a criteria group in a set of criteria groups is identified to utilize for identification of one or more images candidates from a set of stored images in the storage. The one or more images candidates from the set of stored images in the storage are identified utilizing one or more image identification criteria in the criteria group. The one or more image candidates are then presented to a user.Type: ApplicationFiled: February 19, 2015Publication date: June 11, 2015Inventors: Deepak R. Ghuge, Dilipkumar S. Jha, Sandeep R. Patil, Eda Sasikanth
-
Patent number: 8995727Abstract: A mechanism is provided for identifying one or more eligible image candidates. Responsive to a determination that the storage of a recently captured image raising an allocated captured images memory space in a storage to a point that storage of a next captured image would raise the allocated captured images memory space in the storage above the predetermined threshold, a criteria group in a set of criteria groups is identified to utilize for identification of one or more images candidates from a set of stored images in the storage. The one or more images candidates from the set of stored images in the storage are identified utilizing one or more image identification criteria in the criteria group. The one or more image candidates are then presented to a user.Type: GrantFiled: August 14, 2012Date of Patent: March 31, 2015Assignee: International Business Machines CorporationInventors: Deepak R. Ghuge, Dilipkumar S. Jha, Sandeep R. Patil, Eda Sasikanth
-
Publication number: 20140310455Abstract: A method for ensuring compliance of service levels corresponding to file-system operations in a deduplicated, tiered storage system comprising storage devices of varying performance levels, each of the performance levels being associated with at least one service level, includes performing a deduplication remapping operation so that a data item corresponding to a higher service level, is stored as an original on a higher performance storage tier while duplicates of the data item corresponding to a lower service level exist in lower performance storage tier at least in part as pointers to the data item on the higher performance storage tier.Type: ApplicationFiled: April 12, 2013Publication date: October 16, 2014Applicant: International Business Machines CorporationInventors: Duane M. Baldwin, Sasikanth Eda, Deepak R. Ghuge, John T. Olson, Sandeep R. Patil
-
Patent number: 8682868Abstract: A method implemented in a computer infrastructure including a combination of hardware and software includes receiving from a local computing device a request to securely delete a file. The method also includes determining the file is deduplicated. The method further includes determining one of: the file is referred to by at least one other file, and the file is not referred to by another file. The method additionally includes securely deleting links associating the file with the local computing device without deleting the file when the file is referred to by at least one other file. The method also includes securely deleting the file when the file is not referred to by another file.Type: GrantFiled: December 2, 2011Date of Patent: March 25, 2014Assignee: International Business Machines CorporationInventors: Deepak R. Ghuge, Bhushan P. Jain, Sandeep R. Patil, Sri Ramanathan, Matthew B. Trevathan
-
Publication number: 20140050369Abstract: A mechanism is provided for identifying one or more eligible image candidates. Responsive to a determination that the storage of a recently captured image raising an allocated captured images memory space in a storage to a point that storage of a next captured image would raise the allocated captured images memory space in the storage above the predetermined threshold, a criteria group in a set of criteria groups is identified to utilize for identification of one or more images candidates from a set of stored images in the storage. The one or more images candidates from the set of stored images in the storage are identified utilizing one or more image identification criteria in the criteria group. The one or more image candidates are then presented to a user.Type: ApplicationFiled: August 14, 2012Publication date: February 20, 2014Applicant: International Business Machines CorporationInventors: Deepak R. Ghuge, Dilipkumar S. Jha, Sandeep R. Patil, Eda Sasikanth