Patents by Inventor Deepak R.
Deepak R. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10169167Abstract: The first computer receives a signal that a second computer is back online after being offline, wherein the second computer was offline because of a failure. The first computer takes a first snapshot of the storage, wherein data that has a higher access frequency is stored on a first drive and data that has a lower access frequency is stored on a second drive. The first computer determines a snapshot difference between the first snapshot and a second snapshot. The first computer transmits the snapshot difference to the second computer, and transmits the data stored on the first drive to the second computer. The first computer promotes the data stored on the second drive to be considered equivalent to data stored drive and transmits the promoted data stored on the second drive to the second computer at the same transmission rate as the data stored on the first drive.Type: GrantFiled: September 19, 2016Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Deepak R. Ghuge, Ashish Pandey, Sandeep R. Patil
-
Publication number: 20180349465Abstract: A computer-implemented method according to one embodiment includes receiving a computation algorithm to be implemented by one of a plurality of nodes, identifying object classification data for objects stored within the plurality of nodes, identifying capability data for each of the plurality of nodes, determining an optimal node for implementing the computation algorithm from the plurality of nodes, based on the object classification data and the capability data, and returning an identification of the optimal node.Type: ApplicationFiled: May 31, 2017Publication date: December 6, 2018Inventors: Sasikanth Eda, Deepak R. Ghuge, Kaustubh I. Katruwar, Sandeep R. Patil
-
Publication number: 20180349197Abstract: A computer-implemented method according to one embodiment includes receiving a computation algorithm to be implemented by one of a plurality of nodes, determining one or more computation operations required by the computation algorithm, identifying virtualization unit metadata for each of the plurality of nodes, determining, from the plurality of nodes, an optimal node for implementing the computation algorithm based on the one or more computation operations and the virtualization unit metadata for each of the plurality of nodes, and returning an identification of the optimal node.Type: ApplicationFiled: May 31, 2017Publication date: December 6, 2018Inventors: Sasikanth Eda, Deepak R. Ghuge, Kaustubh I. Katruwar, Sandeep R. Patil
-
Publication number: 20180293265Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a file system consistency check utility on an erasure coded object storage architecture. Responsive to the file system consistency check utility determining a directory entry does not exist for a given file inode, the mechanism determines whether the given file is part of an erasure code schema of an object storage architecture. Responsive to the file system consistency check utility determining the given file/fragment is part of the erasure code schema, the mechanism determines a container (parent directory) for the given erasure code fragment, wherein the given fragment is a given error code fragment of an object, based on other erasure code fragments corresponding to the object and their placement schematics in the erasure code schema.Type: ApplicationFiled: April 6, 2017Publication date: October 11, 2018Inventors: Sasikanth Eda, Deepak R. Ghuge, Huzefa H. Pancha, Sandeep R. Patil
-
Patent number: 10089146Abstract: A first storlet engine is monitored for a first computational algorithm. The storlet engine includes a lookup table including a first characteristic of one or more nodes, a parser unit, and a resource availability monitor. The first computational algorithm is parsed into an abstract syntax tree using a parser unit. A first category of the first computational algorithm is determined by analyzing the abstract syntax tree. A first node of the lookup table with the first characteristic matching the first category for processing the first computational algorithm is identified based on the first category of the computational algorithm. The first computational algorithm is sent to the first node for processing.Type: GrantFiled: March 31, 2016Date of Patent: October 2, 2018Assignee: International Business Machines CorporationInventors: Brijesh Chougule, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil, Sanjay K. Sudam
-
Publication number: 20180279140Abstract: Providing call continuity for an ongoing call of a User Equipment (UE) of a wireless communication by defining UE behavior specifying actions to be taken by the UE upon detection of occurrence of an event among a plurality of events that may occur during the ongoing call.Type: ApplicationFiled: January 19, 2018Publication date: September 27, 2018Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Sathia CHANDRANE, Deepak R., Bharat Vinayak BHAT, Nitin JAIN
-
Patent number: 10073747Abstract: The first computer receives a signal that a second computer is back online after being offline, wherein the second computer was offline because of a failure. The first computer takes a first snapshot of the storage, wherein data that has a higher access frequency is stored on a first drive and data that has a lower access frequency is stored on a second drive. The first computer determines a snapshot difference between the first snapshot and a second snapshot. The first computer transmits the snapshot difference to the second computer, and transmits the data stored on the first drive to the second computer. The first computer promotes the data stored on the second drive to be considered equivalent to data stored drive and transmits the promoted data stored on the second drive to the second computer at the same transmission rate as the data stored on the first drive.Type: GrantFiled: December 20, 2017Date of Patent: September 11, 2018Assignee: International Business Machines CorporationInventors: Deepak R. Ghuge, Ashish Pandey, Sandeep R. Patil
-
Publication number: 20180239873Abstract: Embodiments for medical condition communication management by one or more processors. A maturity score and medical condition acceptance score relating to a medical condition of a user may be estimated according to data collected from one or more devices associated with the user. The maturity score may represent a measure of an emotional state, age, and cognitive reasoning ability. The medical condition acceptance score may represent a measure of understanding and acceptance capability of the medical condition. One or more search results responsive to a search query related to the medical condition submitted by the user may be adjusted according to the maturity score, the medical condition acceptance score, and an appropriateness of communications for the one or more search results based on a plurality of identified contextual factors.Type: ApplicationFiled: February 21, 2017Publication date: August 23, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sasikanth EDA, Deepak R. GHUGE, Sandeep R. PATIL, Sachin C. PUNADIKAR
-
Patent number: 10031819Abstract: Embodiments of the present invention provide a method, computer program product, and computer system for leveraging checkpoint restart. The method includes determining a first set of work stages within a first computation algorithm. A set of permissions associated with the first set of work stages are identified, and the work stages are stored as checkpoints in either a public location or a private location. Upon deployment of a second computation algorithm, a second set of work stages within the second computation algorithm is compared to the first set of work stages. If the second set of work stages match with the first set of work stages, the second computation algorithm is executed using the checkpoint associated with the matching work stages.Type: GrantFiled: July 14, 2016Date of Patent: July 24, 2018Assignee: International Business Machines CorporationInventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
-
Patent number: 10031817Abstract: Embodiments of the present invention provide a method, computer program product, and computer system for leveraging checkpoint restart. The method includes determining a first set of work stages within a first computation algorithm. A set of permissions associated with the first set of work stages are identified, and the work stages are stored as checkpoints in either a public location or a private location. Upon deployment of a second computation algorithm, a second set of work stages within the second computation algorithm is compared to the first set of work stages. If the second set of work stages match with the first set of work stages, the second computation algorithm is executed using the checkpoint associated with the matching work stages.Type: GrantFiled: November 5, 2015Date of Patent: July 24, 2018Assignee: International Business Machines CorporationInventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
-
Publication number: 20180095840Abstract: The first computer receives a signal that a second computer is back online after being offline, wherein the second computer was offline because of a failure. The first computer takes a first snapshot of the storage, wherein data that has a higher access frequency is stored on a first drive and data that has a lower access frequency is stored on a second drive. The first computer determines a snapshot difference between the first snapshot and a second snapshot. The first computer transmits the snapshot difference to the second computer, and transmits the data stored on the first drive to the second computer. The first computer promotes the data stored on the second drive to be considered equivalent to data stored drive and transmits the promoted data stored on the second drive to the second computer at the same transmission rate as the data stored on the first drive.Type: ApplicationFiled: December 20, 2017Publication date: April 5, 2018Inventors: Deepak R. Ghuge, Ashish Pandey, Sandeep R. Patil
-
Patent number: 9928015Abstract: In an approach for determining printability of an electronic file, a computer electronically receives a file for printing. The computer parses the file for one or more of text, images, and formatting indicative of potential copyrighted material. The computer, in response to identifying any text, images, or formatting indicative of potential copyrighted material, identifies potential copyrighted material within the file. The computer determines whether the file may be printed based, at least in part, on the identified potential copyrighted material. In another approach for determining printability of an electronic document, a computer electronically receives a document for printing. The computer locates attributes associated with the document and stored in a separate database, which includes one or more of the following: ownership, licensing information, printability, and number of prints allowed. The computer determines the document is printable based on the attributes and prints the document.Type: GrantFiled: April 15, 2015Date of Patent: March 27, 2018Assignee: International Business Machines CorporationInventors: Sasikanth Eda, Deepak R. Ghuge, Sridhar Puvvala, Riyazahamad M. Shiraguppi
-
Publication number: 20180081766Abstract: The first computer receives a signal that a second computer is back online after being offline, wherein the second computer was offline because of a failure. The first computer takes a first snapshot of the storage, wherein data that has a higher access frequency is stored on a first drive and data that has a lower access frequency is stored on a second drive. The first computer determines a snapshot difference between the first snapshot and a second snapshot. The first computer transmits the snapshot difference to the second computer, and transmits the data stored on the first drive to the second computer. The first computer promotes the data stored on the second drive to be considered equivalent to data stored drive and transmits the promoted data stored on the second drive to the second computer at the same transmission rate as the data stored on the first drive.Type: ApplicationFiled: September 19, 2016Publication date: March 22, 2018Inventors: Deepak R. Ghuge, Ashish Pandey, Sandeep R. Patil
-
Publication number: 20180077268Abstract: The present invention provides a computer implemented method, system, and computer program product of assigning pools of internet protocols to file access protocols for network-attached storage (NAS) failover. In an exemplary embodiment, the present invention includes generating, by a computer system, a pool of internet protocol addresses for each of a plurality of computer file access protocols running on a plurality of protocol node computer systems, where the protocol nodes are configured to access a plurality of computer files stored on a NAS system via computer file access protocol services corresponding to the file access protocols, resulting in IP pools comprising IP addresses, and for each IP pool, among the IP pools, corresponding to a file access protocol among the file access protocols, assigning, by the computer system, the IP addresses in the IP pool to protocol nodes, among the protocol nodes, for which the file access protocol is operational.Type: ApplicationFiled: September 14, 2016Publication date: March 15, 2018Inventors: Deepak R. Ghuge, Sandeep R. Patil
-
Patent number: 9904497Abstract: In an approach for determining printability of an electronic file, a computer electronically receives a file for printing. The computer parses the file for one or more of text, images, and formatting indicative of potential copyrighted material. The computer, in response to identifying any text, images, or formatting indicative of potential copyrighted material, identifies potential copyrighted material within the file. The computer determines whether the file may be printed based, at least in part, on the identified potential copyrighted material. In another approach for determining printability of an electronic document, a computer electronically receives a document for printing. The computer locates attributes associated with the document and stored in a separate database, which includes one or more of the following: ownership, licensing information, printability, and number of prints allowed. The computer determines the document is printable based on the attributes and prints the document.Type: GrantFiled: November 12, 2014Date of Patent: February 27, 2018Assignee: International Business Machines CorporationInventors: Sasikanth Eda, Deepak R. Ghuge, Sridhar Puvvala, Riyazahamad M. Shiraguppi
-
Publication number: 20180046692Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.Type: ApplicationFiled: October 25, 2017Publication date: February 15, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lawrence C. BLOUNT, Deepak R. GHUGE, Shah Mohammad R. ISLAM, Sandeep R. PATIL, Riyazahamad M. SHIRAGUPPI, Renu TEWARI
-
Patent number: 9876853Abstract: According to one exemplary embodiment, a method for embedded compute engine architecture optimization is provided. The method may include receiving an object. The method may also include determining a first category for the received object, whereby the determined first category is associated with a node. The method may then include storing the received object on the node associated with the determined first category. The method may further include receiving an algorithm. The method may also include determining a second category for the received algorithm, whereby the determined second category is associated with the node. The method may then include executing the received algorithm on the node, whereby the received algorithm uses the received object stored on the node.Type: GrantFiled: August 19, 2015Date of Patent: January 23, 2018Assignee: International Business Machines CorporationInventors: Sasikanth Eda, Deepak R. Ghuge, Kaustubh I. Katruwar, Sandeep R. Patil
-
Patent number: 9870414Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.Type: GrantFiled: October 14, 2016Date of Patent: January 16, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lawrence C. Blount, Deepak R. Ghuge, Shah Mohammad R. Islam, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Renu Tewari
-
Publication number: 20180005168Abstract: A method and system for determining implementing a bidding based product delivery determination process is provided. The method includes presenting a product for purchase via a bidding process. Packages including the product are pre-loaded on delivery vehicles for delivery within geographical zones including maximum travel distances. Monetary bids for the product are received from users with respect to the delivery vehicles and a user submitting a highest monetary bid is identified. In response, a first delivery vehicle is directed to a location of the user. A profit sharing process with respect to the users and an entity providing the product is enabled.Type: ApplicationFiled: June 30, 2016Publication date: January 4, 2018Inventors: Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil, Gandhi Sivakumar
-
Publication number: 20170329792Abstract: A mechanism is provided for optimizing object storage workflow. A category of a computational algorithm received from a user of a client device is identified, the category identifying a set of features that are optimal for executing the computational algorithm and comprising hardware, operating system type, operating system version, and virtualization technology. Features associated with a plurality of nodes in a plurality of infrastructures in an object storage architecture are searched for at least one node that has the set of features identified by the category of the computational algorithm. Responsive to identifying a node that has the set of features identified by the category of the computational algorithm, a determination is made as to whether resources associated with the node are immediately available. Responsive to the resources associated with the node being immediately available, the computational algorithm is issued to the node for execution.Type: ApplicationFiled: May 10, 2016Publication date: November 16, 2017Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil, Sachin C. Punadikar