Patents by Inventor Dhaval K. Shah
Dhaval K. Shah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130166842Abstract: A computational device receives a request to create a logical unit. Associated with the request is a first type of storage pool in which creation of the logical unit is desired. In response to determining that adequate space is not available to create the logical unit in the first type of storage pool, a determination is made as to whether a first indicator is configured to allow borrowing of storage space from a second type of storage pool. In response to determining that the first indicator is configured to allow borrowing of storage space from the second type of storage pool, the logical unit is created in the second type of storage pool and a listener application is initiated. The listener application determines that free space that is adequate to store the logical unit has become available in the first type of storage pool.Type: ApplicationFiled: March 4, 2013Publication date: June 27, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jorge D. Acuna, Fahad Mahmood, Dhaval K. Shah
-
Publication number: 20130086316Abstract: Physical storage devices are configured as a redundant array of independent disks (RAID). As such, storage space of the physical storage devices is allocated to the RAID, and each physical storage device is part of the RAID. Where a portion of the storage space of the physical storage devices is not allocated to the RAID, this portion of the storage space from a mixed drive capacity is configured so that it is usable and is not wasted.Type: ApplicationFiled: October 1, 2011Publication date: April 4, 2013Inventors: Dhaval K. Shah, Ganesh Sivaperuman, Gaurav Chhaunker, Muthu A. Muthiah
-
Patent number: 8387869Abstract: A device, a system, and methods of securing an authentication device are disclosed. A security system includes an authentication device configured for transmitting a second signal to deactivate the authentication device, in response to receiving a first signal. The authentication device further includes a receiver, a transmitter, an activation device, and a power source, and wherein the second signal includes a unique identifier of the authentication device. The security system further includes an authentication device reader configured for receiving the second signal from the authentication device, extracting the unique identifier from the second signal, and transmitting the extracted unique identifier.Type: GrantFiled: December 24, 2009Date of Patent: March 5, 2013Assignee: International Business Machines CorporationInventors: Dhaval K. Shah, Gaurav Chhaunker, Vikram B. Sanap
-
Publication number: 20130054768Abstract: Object manager information is maintained for object managers in a network indicating a device type of devices in the network managed by the object managers and device information providing information on the devices in the network, wherein the object managers have access to the object manager information. A determination is made from the object manager information a second object manager comprising one of the object managers in the network managing a same device type as the devices managed by the first object manager. The first and second object managers communicate to establish a migration relationship between the first and the second object managers. In response to a migration event at the second object manager, the first object manager accesses the device information for the second object manager to manage the devices currently managed by the second object manager.Type: ApplicationFiled: August 23, 2011Publication date: February 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pankaj S. Bavishi, Shripad J. Nadgowda, Sandeep R. Patil, Dhaval K. Shah
-
Publication number: 20120323861Abstract: Exemplary methods, computer systems, and computer program products for smarter deduplicated caching of queries for green IT management in a computer storage device are provided. In one embodiment, the computer environment is configured for ascertaining the most-used data access chains. Multiple access paths to identical data are determined for the most-used data access chains. A generalized chain that is formed from the plurality of access paths to the identical data is determined. Multiple keys and information relating to the access paths to the identical data is deduplicated.Type: ApplicationFiled: June 17, 2011Publication date: December 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jorge D. ACUNA, Pankaj S. BAVISHI, Ramani R. ROUTRAY, Dhaval K. SHAH
-
Patent number: 8335859Abstract: An apparatus, system, and method are disclosed for distributing data requests between data centers. A request module receives a data operation request from a client. The data operation request corresponds to mirrored data stored at a plurality of data centers. A metadata module maintains a set of data center cooling efficiency factors for each of the plurality of data centers. Each data center cooling efficiency factor comprises data relating to operational costs of a data center. A cost reduction module compares sets of data center cooling efficiency factors for each of the plurality of data centers to select the most efficient data center from the plurality of data centers. A response module sends the data operation request to the selected data center.Type: GrantFiled: June 17, 2009Date of Patent: December 18, 2012Assignee: International Business Machines CorporationInventors: Abhinay R. Nagpal, Sandeep R. Patil, Dhaval K. Shah, Yan W. Stein
-
Publication number: 20120239631Abstract: A method, a system, and a computer-readable storage medium are provided for data management. The method may comprise identifying a predefined set of data storage parameters and a predefined set of data scrubbing parameters. The method further may comprise determining the predefined set of data scrubbing parameters for first data in a first data storage based on the predefined set of data storage parameters for the first data and performing data scrubbing for the first data using the determined predefined set of data scrubbing parameters. Furthermore, the method may comprise comparing first data in the first data storage and corresponding second data in a second data storage. Upon determining a mismatch between the first data and the second data, the method further may comprise synchronizing the first data with the second data as a result of the comparison.Type: ApplicationFiled: May 29, 2012Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: ABHINAY R. NAGPAL, SANDEEP R. PATIL, DHAVAL K. SHAH, YAN W. STEIN
-
Publication number: 20120215455Abstract: In at least one embodiment, a method and system for accumulating geospatial location data and biomedical data for an individual during his/her travels is provided. In at least one embodiment, a device uses at least one location signal to determine geospatial data and receives a plurality of biomedical signals with both data types being stored for possible later retrieval for providing a diagnosis for the individual if a medical condition arises.Type: ApplicationFiled: February 17, 2011Publication date: August 23, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sandeep R. Patil, John G. Musial, Dhaval K. Shah, Abhinay R. Nagpal
-
Publication number: 20120210060Abstract: A computational device receives a request to create a logical unit. Associated with the request is a first type of storage pool in which creation of the logical unit is desired. In response to determining that adequate space is not available to create the logical unit in the first type of storage pool, a determination is made as to whether a first indicator is configured to allow borrowing of storage space from a second type of storage pool. In response to determining that the first indicator is configured to allow borrowing of storage space from the second type of storage pool, the logical unit is created in the second type of storage pool and a listener application is initiated. The listener application determines that free space that is adequate to store the logical unit has become available in the first type of storage pool.Type: ApplicationFiled: February 16, 2011Publication date: August 16, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jorge D. Acuna, Fahad Mahmood, Dhaval K. Shah
-
Publication number: 20120202604Abstract: An embodiment of the invention includes a device including at least one probe for delivering an electrical shock to a subject when the probe is in physical contact with the subject. A power source is connected to the probe for providing electrical power to the probe upon actuation of a trigger. The device further includes a medical device sensor for detecting signals emitted from a medical device present in the subject. In at least one embodiment, an alarm is connected to the medical device sensor, wherein the alarm provides an audio and/or a visual alert when the medical device sensor detects signals emitted from the medical device. In at least one embodiment, an override mechanism is connected to the medical device sensor, wherein the override mechanism prevents actuation of the trigger when the medical device sensor detects signals emitted from the medical device.Type: ApplicationFiled: February 8, 2011Publication date: August 9, 2012Applicant: International Business Machines CorporationInventors: John G. Musial, Abhinay R. Nagpal, Sandeep R. Patil, Dhaval K. Shah
-
Patent number: 8229901Abstract: A method, a system, and a computer program product are provided for data management. The method may comprise identifying a predefined set of data storage parameters and a predefined set of data scrubbing parameters. The method further may comprise determining the predefined set of data scrubbing parameters for first data in a first data storage based on the predefined set of data storage parameters for the first data and performing data scrubbing for the first data using the determined predefined set of data scrubbing parameters. Furthermore, the method may comprise comparing first data in the first data storage and corresponding second data in a second data storage. If a mismatch is determined between the first data and the second data, the method further may comprise synchronizing the first data with the second data as a result of the comparison.Type: GrantFiled: September 4, 2010Date of Patent: July 24, 2012Assignee: International Business Machines CorporationInventors: Abhinay R. Nagpal, Sandeep R. Patil, Dhaval K. Shah, Yan W. Stein
-
Publication number: 20120131480Abstract: A virtual machine snapshot mechanism takes snapshots of virtual machines on a computer system, generates relationships between a snapshot and resources on the computer system, and provides a graphical display of one or more snapshots that allow visually determining which snapshots include which resources. A user may search the snapshots based on user-specified criteria. If an exact match is not available, and closest match is identified in the graphical display.Type: ApplicationFiled: November 24, 2010Publication date: May 24, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael T. Kalmbach, Dhaval K. Shah
-
Publication number: 20120059803Abstract: A method, a system, and a computer program product are provided for data management. The method may comprise identifying a predefined set of data storage parameters and a predefined set of data scrubbing parameters. The method further may comprise determining the predefined set of data scrubbing parameters for first data in a first data storage based on the predefined set of data storage parameters for the first data and performing data scrubbing for the first data using the determined predefined set of data scrubbing parameters. Furthermore, the method may comprise comparing first data in the first data storage and corresponding second data in a second data storage. If a mismatch is determined between the first data and the second data, the method further may comprise synchronizing the first data with the second data as a result of the comparison.Type: ApplicationFiled: September 4, 2010Publication date: March 8, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: ABHINAY R. NAGPAL, SANDEEP R. PATIL, DHAVAL K. SHAH, YAN W. STEIN
-
Publication number: 20110161121Abstract: A method, system, and article for management of travel and travel related matters. Both a source and a designation are selected, together with the associated departure and arrival information and the mode of transportation. A geographic region affected by a health related event is identified, and then employed to determine if a craft in support of the selected travel has been or is intended to be in the identified region. Exposure to the identified health related event may be mitigated by supporting an amendment to the mode of transportation.Type: ApplicationFiled: December 25, 2009Publication date: June 30, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Abhinay R. Nagpal, Sandeep Ramesh Patil, Dhaval K. Shah, Yan W. Stein
-
Publication number: 20110155802Abstract: A device, a system, and methods of securing an authentication device are disclosed. A security system includes an authentication device configured for transmitting a second signal to deactivate the authentication device, in response to receiving a first signal. The authentication device further includes a receiver, a transmitter, an activation device, and a power source, and wherein the second signal includes a unique identifier of the authentication device. The security system further includes an authentication device reader configured for receiving the second signal from the authentication device, extracting the unique identifier from the second signal, and transmitting the extracted unique identifier.Type: ApplicationFiled: December 24, 2009Publication date: June 30, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dhaval K. Shah, Gaurav Chhaunker, Vikram B. Sanap
-
Publication number: 20100324751Abstract: An apparatus, system, and method are disclosed for distributing data requests between data centers. A request module receives a data operation request from a client. The data operation request corresponds to mirrored data stored at a plurality of data centers. A metadata module maintains a set of data center cooling efficiency factors for each of the plurality of data centers. Each data center cooling efficiency factor comprises data relating to operational costs of a data center. A cost reduction module compares sets of data center cooling efficiency factors for each of the plurality of data centers to select the most efficient data center from the plurality of data centers. A response module sends the data operation request to the selected data center.Type: ApplicationFiled: June 17, 2009Publication date: December 23, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Abhinay R. Nagpal, Sandeep R. Patil, Dhaval K. Shah, Yan W. Stein
-
Publication number: 20100156909Abstract: Disclosed is a computer implemented method, computer program product, and apparatus to decorate visible attributes of a rendered avatar. A server may collect a first user profile of a first avatar, the first user profile having at least one interest of a user. Next, the server may receive a location of the first avatar, wherein the location is associated with a view to at least a second avatar. The server can identify the second avatar among a group of avatars visible with respect to the first avatar. Further, the server may read a target profile of the second avatar then determine whether the second user profile satisfies a criterion based on the first user profile and the target profile. In addition, the server may render a modified rendered avatar to a client, responsive to the determination that the target profile satisfies the criterion.Type: ApplicationFiled: December 19, 2008Publication date: June 24, 2010Applicant: International Business Machines CorporationInventors: Dwip N. Banerjee, Aditya Mohan, Sandeep R. Patil, Dhaval K. Shah
-
Publication number: 20100011320Abstract: The present disclosure is directed to a method for allowing a user to configure shortcut keys to a specific application.Type: ApplicationFiled: July 11, 2008Publication date: January 14, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ankur B. Shah, Dhaval K. Shah, Phong A. Pham
-
Patent number: 7502831Abstract: An embodiment provides a flexible way to categorize instant messages (IM) or instant data by segmenting them. The default category would be viewable and/or readable as currently is with no change. However, those categories which are categorized as CONFIDENTIAL and/or PERSONAL would be displayed in a hidden form. The invention is demonstrated using a CONFIDENTIAL category; however, the invention is not limited to just CONFIDENTIAL category as it can be applied to other categories as well, such as INFORMATIONAL. An embodiment of the invention allows users to view CONFIDENTIAL informational in private and data would be hidden on the receiving end until a request to un-hide is made by the receiver.Type: GrantFiled: March 10, 2008Date of Patent: March 10, 2009Assignee: International Business Machines CorporationInventors: Mike V. Macias, Salil Pradeep Gandhi, Saidas Tukaram Kottawar, Dhaval K. Shah, Sandip Dnyaneshwar Mahajan
-
Publication number: 20090029679Abstract: A call response time program in the memory of a server computer interacts with a mobile phone communication program to give a caller a likely response time when the call has been missed. The software comprises a configuration program, a call analyzer program, a message program, and a billing program. Auto profiling may be selected and an artificial intelligence program can be invoked. The configuration program creates a plurality of user profiles and a plurality of message files. The call analyzer program creates a plurality of user histories and may optionally invoke the artificial intelligence program. The message program responds to a missed call by sending an appropriate message indicating a likely response time. Alternatively, an interactive voice response system (IVRS) may be used.Type: ApplicationFiled: July 25, 2007Publication date: January 29, 2009Inventors: Teng Hu, Dhaval K. Shah, Ankur Bk Shah, Ganesh Sivamani