Patents by Inventor Deepak R.

Deepak R. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170286178
    Abstract: A first storlet engine is monitored for a first computational algorithm. The storlet engine includes a lookup table including a first characteristic of one or more nodes, a parser unit, and a resource availability monitor. The first computational algorithm is parsed into an abstract syntax tree using a parser unit. A first category of the first computational algorithm is determined by analyzing the abstract syntax tree. A first node of the lookup table with the first characteristic matching the first category for processing the first computational algorithm is identified based on the first category of the computational algorithm. The first computational algorithm is sent to the first node for processing.
    Type: Application
    Filed: March 31, 2016
    Publication date: October 5, 2017
    Inventors: Brijesh Chougule, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil, Sanjay K. Sudam
  • Patent number: 9740705
    Abstract: A method for adjusting roles of nodes in a distributed clustered file system can include receiving a first computation operation. The method can also include profiling the first computation operation according to one or more metrics, including identifying and categorizing a first process performed by the first computation operation. The method can also include determining a first file system attribute of the first computation operation. The method can also include performing a lookup operation based on a first computation operation template and identifying that the first computation operation serves a first file system role. The method can also include receiving an identification, in response to the performing the lookup, that a first node of a plurality of nodes can utilize additional computation of the first file system role. The method can also include executing the first computation operation on the first node.
    Type: Grant
    Filed: December 4, 2015
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
  • Publication number: 20170185305
    Abstract: A method for optimizing duplication of disk sector architecture in a heterogeneous cloud systems environment, is provided. The method includes identifying a file system platform and name space for tracking a plurality of disk, of the disk sector architecture. The method further includes configuring a systems framework, of the identified file system platform, for collecting information of the plurality of disk assigned to the file systems platform. The method further includes equipping the file system platform and a monitoring system with learning or knowledge based engines to identify workload types for utilizing the file system platform and the named space to identify health of multiple platters of the plurality of disk assigned to the file systems platform. The method further includes calculating duplication data of sectors of the plurality of disks of the identified workload types, based on the sectors of disks.
    Type: Application
    Filed: December 28, 2015
    Publication date: June 29, 2017
    Inventors: Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil, Sanjay K. Sudam
  • Publication number: 20170161298
    Abstract: A method for adjusting roles of nodes in a distributed clustered file system can include receiving a first computation operation. The method can also include profiling the first computation operation according to one or more metrics, including identifying and categorizing a first process performed by the first computation operation. The method can also include determining a first file system attribute of the first computation operation. The method can also include performing a lookup operation based on a first computation operation template and identifying that the first computation operation serves a first file system role. The method can also include receiving an identification, in response to the performing the lookup, that a first node of a plurality of nodes can utilize additional computation of the first file system role. The method can also include executing the first computation operation on the first node.
    Type: Application
    Filed: December 4, 2015
    Publication date: June 8, 2017
    Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
  • Patent number: 9659282
    Abstract: The method includes identifying a location of an individual and an amount of time the individual will be in the location. The method further includes identifying one or more contacts of the individual that are within a threshold distance of the identified location of the individual during the identified amount time the individual will be in the location. The method further includes generating a first visitation schedule and corresponding visitation route for the individual based upon the identified status for the one or more contacts of the individual based upon social media activity, the identified frequency of interaction between the individual and the identified one or more contacts of the individual, and the determined distances from the individual to the identified one or more contacts and between each of the identified one or more contacts.
    Type: Grant
    Filed: February 17, 2016
    Date of Patent: May 23, 2017
    Assignee: International Business Machines Corpoation
    Inventors: Sasikanth Eda, Deepak R. Ghuge, John G. Musial, Sandeep R. Patil, Gandhi Sivakumar
  • Publication number: 20170132090
    Abstract: Embodiments of the present invention provide a method, computer program product, and computer system for leveraging checkpoint restart. The method includes determining a first set of work stages within a first computation algorithm. A set of permissions associated with the first set of work stages are identified, and the work stages are stored as checkpoints in either a public location or a private location. Upon deployment of a second computation algorithm, a second set of work stages within the second computation algorithm is compared to the first set of work stages. If the second set of work stages match with the first set of work stages, the second computation algorithm is executed using the checkpoint associated with the matching work stages.
    Type: Application
    Filed: July 14, 2016
    Publication date: May 11, 2017
    Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
  • Publication number: 20170131923
    Abstract: Embodiments of the present invention provide a method, computer program product, and computer system for leveraging checkpoint restart. The method includes determining a first set of work stages within a first computation algorithm. A set of permissions associated with the first set of work stages are identified, and the work stages are stored as checkpoints in either a public location or a private location. Upon deployment of a second computation algorithm, a second set of work stages within the second computation algorithm is compared to the first set of work stages. If the second set of work stages match with the first set of work stages, the second computation algorithm is executed using the checkpoint associated with the matching work stages.
    Type: Application
    Filed: November 5, 2015
    Publication date: May 11, 2017
    Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
  • Publication number: 20170116675
    Abstract: A method is provided to use a weighted model for determining a term insurance premium based on each operation performed by a user in a software defined infrastructure. For each operation performed by the user, the operation is classified and weighted against its results, and risk associated with the results is analyzed. A term insurance amount is calculated based on the risk for recovery, and expertise of IT resource vendor. An end user is equipped with flexibility of enabling insurance for a particular software operation.
    Type: Application
    Filed: October 27, 2015
    Publication date: April 27, 2017
    Inventors: Sasikanth Eda, Deepak R. Ghuge, Varun Mittal, Sandeep R. Patil, Gandhi Sivakumar
  • Publication number: 20170054796
    Abstract: According to one exemplary embodiment, a method for embedded compute engine architecture optimization is provided. The method may include receiving an object. The method may also include determining a first category for the received object, whereby the determined first category is associated with a node. The method may then include storing the received object on the node associated with the determined first category. The method may further include receiving an algorithm. The method may also include determining a second category for the received algorithm, whereby the determined second category is associated with the node. The method may then include executing the received algorithm on the node, whereby the received algorithm uses the received object stored on the node.
    Type: Application
    Filed: August 19, 2015
    Publication date: February 23, 2017
    Inventors: Sasikanth Eda, Deepak R. Ghuge, Kaustubh I. Katruwar, Sandeep R. Patil
  • Publication number: 20170032008
    Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.
    Type: Application
    Filed: October 14, 2016
    Publication date: February 2, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lawrence C. BLOUNT, Deepak R. GHUGE, Shah Mohammad R. ISLAM, Sandeep R. PATIL, Riyazahamad M. SHIRAGUPPI, Renu TEWARI
  • Publication number: 20160366217
    Abstract: An efficient cloning mechanism is provided for a distributed storage environment, where, for example, a private cloud computing environment and a public cloud computing environment are included in a hybrid cloud computing environment (on-premise object storage to off-premise computation resources), to improve computation workloads. The disclosed algorithm forms an efficient cloning mechanism in a hybrid storage environment where the read/write speed of data from the disk is not limited by its angular velocity.
    Type: Application
    Filed: June 12, 2015
    Publication date: December 15, 2016
    Inventors: Sasikanth Eda, Deepak R. Ghuge, Yu-Cheng Hsu, Sandeep R. Patil
  • Publication number: 20160357509
    Abstract: A method performed in a portable computing device for intelligently performing audio playback, upon connecting with an audio output system. The portable computing device detects that a connection is made with an audio output system. The portable computing device determines a first audio playback application that last played audio and when the first audio playback application last played audio. If the first audio playback application played audio within a specified amount of time in the past, then the portable computing device signals that audio playback be performed from the first audio playback application (through the connection made with the audio output system.
    Type: Application
    Filed: October 20, 2015
    Publication date: December 8, 2016
    Inventors: Thomas Alsina, Andre M. Boule, Craig M. Federighi, Gregory R. Chapman, Deepak R. Iyer, Jonathan A. Bennett, Stephen O. Lemay, Edward T. Schmidt, Charles Magahern
  • Patent number: 9501493
    Abstract: A method for adjusting roles of nodes in a distributed clustered file system can include receiving a first computation operation and profiling the first computation operation according to one or more metrics. The method can also include determining, based on the profiling of the first computation operation, a first file system attribute of the first computation operation. The method can also include identifying that the first computation operation serves a first file system role and identifying a first hardware characteristic of hardware on which a first node of a plurality of nodes is hosted. The method can also include receiving an identification that the first node can utilize additional computation of the first file system role and instantiating a virtualization unit on the first node.
    Type: Grant
    Filed: December 4, 2015
    Date of Patent: November 22, 2016
    Assignee: International Business Machines Corporation
    Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
  • Patent number: 9451083
    Abstract: Embodiments of the present invention may relate generally to the field of computing, and more particularly to estimating an answering time by a user of a communication on a communication device. A user may receive a communication on a first communication device from a second communication device. A distance of the user from the first communication device may be determined. A time may be estimated for the user to reach the first communication device based on the distance determination. The time estimation may be communicated to the second communication device.
    Type: Grant
    Filed: August 3, 2015
    Date of Patent: September 20, 2016
    Assignee: International Business Machines Corporation
    Inventors: Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil, Gandhi Sivakumar
  • Publication number: 20160180297
    Abstract: The method includes identifying a location of an individual and an amount of time the individual will be in the location. The method further includes identifying one or more contacts of the individual that are within a threshold distance of the identified location of the individual during the identified amount time the individual will be in the location. The method further includes generating a first visitation schedule and corresponding visitation route for the individual based upon the identified status for the one or more contacts of the individual based upon social media activity, the identified frequency of interaction between the individual and the identified one or more contacts of the individual, and the determined distances from the individual to the identified one or more contacts and between each of the identified one or more contacts.
    Type: Application
    Filed: February 17, 2016
    Publication date: June 23, 2016
    Inventors: Sasikanth Eda, Deepak R. Ghuge, John G. Musial, Sandeep R. Patil, Gandhi Sivakumar
  • Patent number: 9357043
    Abstract: Methods and devices for sensor-based user interface control are disclosed. In one embodiment, a method for determining a characteristic of handedness includes sensing a rotation of a mobile device, determining a direction of rotation based at least in part on accessing information indicative of a first position state prior to sensing the rotation and accessing information indicative of a second position state subsequent to sensing the rotation, and determining the characteristic of handedness based at least in part on the direction of rotation, the first position state, and the second position state. The characteristic of handedness includes one of a left handedness or right handedness. The method further includes determining a user interface mode based on the characteristic of handedness determined, and controlling the mobile device in accordance with the user interface mode determined.
    Type: Grant
    Filed: January 29, 2014
    Date of Patent: May 31, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Leonid Sheynblat, John T. Larkin, Deepak R. Chandra
  • Publication number: 20160132276
    Abstract: In an approach for determining printability of an electronic file, a computer electronically receives a file for printing. The computer parses the file for one or more of text, images, and formatting indicative of potential copyrighted material. The computer, in response to identifying any text, images, or formatting indicative of potential copyrighted material, identifies potential copyrighted material within the file. The computer determines whether the file may be printed based, at least in part, on the identified potential copyrighted material. In another approach for determining printability of an electronic document, a computer electronically receives a document for printing. The computer locates attributes associated with the document and stored in a separate database, which includes one or more of the following: ownership, licensing information, printability, and number of prints allowed. The computer determines the document is printable based on the attributes and prints the document.
    Type: Application
    Filed: November 12, 2014
    Publication date: May 12, 2016
    Inventors: Sasikanth Eda, Deepak R. Ghuge, Sridhar Puvvala, Riyazahamad M. Shiraguppi
  • Publication number: 20160132897
    Abstract: In an approach for determining printability of an electronic file, a computer electronically receives a file for printing. The computer parses the file for one or more of text, images, and formatting indicative of potential copyrighted material. The computer, in response to identifying any text, images, or formatting indicative of potential copyrighted material, identifies potential copyrighted material within the file. The computer determines whether the file may be printed based, at least in part, on the identified potential copyrighted material. In another approach for determining printability of an electronic document, a computer electronically receives a document for printing. The computer locates attributes associated with the document and stored in a separate database, which includes one or more of the following: ownership, licensing information, printability, and number of prints allowed. The computer determines the document is printable based on the attributes and prints the document.
    Type: Application
    Filed: April 15, 2015
    Publication date: May 12, 2016
    Inventors: Sasikanth Eda, Deepak R. Ghuge, Sridhar Puvvala, Riyazahamad M. Shiraguppi
  • Patent number: 9325800
    Abstract: The method includes identifying a location of an individual and an amount of time the individual will be in the location. The method further includes identifying one or more contacts of the individual that are within a threshold distance of the identified location of the individual during the identified amount time the individual will be in the location. The method further includes generating a first visitation schedule and corresponding visitation route for the individual based upon the identified status for the one or more contacts of the individual based upon social media activity, the identified frequency of interaction between the individual and the identified one or more contacts of the individual, and the determined distances from the individual to the identified one or more contacts and between each of the identified one or more contacts.
    Type: Grant
    Filed: December 18, 2014
    Date of Patent: April 26, 2016
    Assignee: International Business Machines Corporation
    Inventors: Sasikanth Eda, Deepak R. Ghuge, John G. Musial, Sandeep R. Patil, Gandhi Sivakumar
  • Patent number: 9298385
    Abstract: A method for ensuring compliance of service levels corresponding to file-system operations in a deduplicated, tiered storage system comprising storage devices of varying performance levels, each of the performance levels being associated with at least one service level, includes performing a deduplication remapping operation so that a data item corresponding to a higher service level, is stored as an original on a higher performance storage tier while duplicates of the data item corresponding to a lower service level exist in lower performance storage tier at least in part as pointers to the data item on the higher performance storage tier.
    Type: Grant
    Filed: April 12, 2013
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventors: Duane M. Baldwin, Sasikanth Eda, Deepak R. Ghuge, John T. Olson, Sandeep R. Patil