Patents by Inventor Dhaval K. Shah

Dhaval K. Shah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130166842
    Abstract: A computational device receives a request to create a logical unit. Associated with the request is a first type of storage pool in which creation of the logical unit is desired. In response to determining that adequate space is not available to create the logical unit in the first type of storage pool, a determination is made as to whether a first indicator is configured to allow borrowing of storage space from a second type of storage pool. In response to determining that the first indicator is configured to allow borrowing of storage space from the second type of storage pool, the logical unit is created in the second type of storage pool and a listener application is initiated. The listener application determines that free space that is adequate to store the logical unit has become available in the first type of storage pool.
    Type: Application
    Filed: March 4, 2013
    Publication date: June 27, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jorge D. Acuna, Fahad Mahmood, Dhaval K. Shah
  • Publication number: 20130086316
    Abstract: Physical storage devices are configured as a redundant array of independent disks (RAID). As such, storage space of the physical storage devices is allocated to the RAID, and each physical storage device is part of the RAID. Where a portion of the storage space of the physical storage devices is not allocated to the RAID, this portion of the storage space from a mixed drive capacity is configured so that it is usable and is not wasted.
    Type: Application
    Filed: October 1, 2011
    Publication date: April 4, 2013
    Inventors: Dhaval K. Shah, Ganesh Sivaperuman, Gaurav Chhaunker, Muthu A. Muthiah
  • Patent number: 8387869
    Abstract: A device, a system, and methods of securing an authentication device are disclosed. A security system includes an authentication device configured for transmitting a second signal to deactivate the authentication device, in response to receiving a first signal. The authentication device further includes a receiver, a transmitter, an activation device, and a power source, and wherein the second signal includes a unique identifier of the authentication device. The security system further includes an authentication device reader configured for receiving the second signal from the authentication device, extracting the unique identifier from the second signal, and transmitting the extracted unique identifier.
    Type: Grant
    Filed: December 24, 2009
    Date of Patent: March 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Dhaval K. Shah, Gaurav Chhaunker, Vikram B. Sanap
  • Publication number: 20130054768
    Abstract: Object manager information is maintained for object managers in a network indicating a device type of devices in the network managed by the object managers and device information providing information on the devices in the network, wherein the object managers have access to the object manager information. A determination is made from the object manager information a second object manager comprising one of the object managers in the network managing a same device type as the devices managed by the first object manager. The first and second object managers communicate to establish a migration relationship between the first and the second object managers. In response to a migration event at the second object manager, the first object manager accesses the device information for the second object manager to manage the devices currently managed by the second object manager.
    Type: Application
    Filed: August 23, 2011
    Publication date: February 28, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Pankaj S. Bavishi, Shripad J. Nadgowda, Sandeep R. Patil, Dhaval K. Shah
  • Publication number: 20120323861
    Abstract: Exemplary methods, computer systems, and computer program products for smarter deduplicated caching of queries for green IT management in a computer storage device are provided. In one embodiment, the computer environment is configured for ascertaining the most-used data access chains. Multiple access paths to identical data are determined for the most-used data access chains. A generalized chain that is formed from the plurality of access paths to the identical data is determined. Multiple keys and information relating to the access paths to the identical data is deduplicated.
    Type: Application
    Filed: June 17, 2011
    Publication date: December 20, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jorge D. ACUNA, Pankaj S. BAVISHI, Ramani R. ROUTRAY, Dhaval K. SHAH
  • Patent number: 8335859
    Abstract: An apparatus, system, and method are disclosed for distributing data requests between data centers. A request module receives a data operation request from a client. The data operation request corresponds to mirrored data stored at a plurality of data centers. A metadata module maintains a set of data center cooling efficiency factors for each of the plurality of data centers. Each data center cooling efficiency factor comprises data relating to operational costs of a data center. A cost reduction module compares sets of data center cooling efficiency factors for each of the plurality of data centers to select the most efficient data center from the plurality of data centers. A response module sends the data operation request to the selected data center.
    Type: Grant
    Filed: June 17, 2009
    Date of Patent: December 18, 2012
    Assignee: International Business Machines Corporation
    Inventors: Abhinay R. Nagpal, Sandeep R. Patil, Dhaval K. Shah, Yan W. Stein
  • Publication number: 20120239631
    Abstract: A method, a system, and a computer-readable storage medium are provided for data management. The method may comprise identifying a predefined set of data storage parameters and a predefined set of data scrubbing parameters. The method further may comprise determining the predefined set of data scrubbing parameters for first data in a first data storage based on the predefined set of data storage parameters for the first data and performing data scrubbing for the first data using the determined predefined set of data scrubbing parameters. Furthermore, the method may comprise comparing first data in the first data storage and corresponding second data in a second data storage. Upon determining a mismatch between the first data and the second data, the method further may comprise synchronizing the first data with the second data as a result of the comparison.
    Type: Application
    Filed: May 29, 2012
    Publication date: September 20, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: ABHINAY R. NAGPAL, SANDEEP R. PATIL, DHAVAL K. SHAH, YAN W. STEIN
  • Publication number: 20120215455
    Abstract: In at least one embodiment, a method and system for accumulating geospatial location data and biomedical data for an individual during his/her travels is provided. In at least one embodiment, a device uses at least one location signal to determine geospatial data and receives a plurality of biomedical signals with both data types being stored for possible later retrieval for providing a diagnosis for the individual if a medical condition arises.
    Type: Application
    Filed: February 17, 2011
    Publication date: August 23, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sandeep R. Patil, John G. Musial, Dhaval K. Shah, Abhinay R. Nagpal
  • Publication number: 20120210060
    Abstract: A computational device receives a request to create a logical unit. Associated with the request is a first type of storage pool in which creation of the logical unit is desired. In response to determining that adequate space is not available to create the logical unit in the first type of storage pool, a determination is made as to whether a first indicator is configured to allow borrowing of storage space from a second type of storage pool. In response to determining that the first indicator is configured to allow borrowing of storage space from the second type of storage pool, the logical unit is created in the second type of storage pool and a listener application is initiated. The listener application determines that free space that is adequate to store the logical unit has become available in the first type of storage pool.
    Type: Application
    Filed: February 16, 2011
    Publication date: August 16, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jorge D. Acuna, Fahad Mahmood, Dhaval K. Shah
  • Publication number: 20120202604
    Abstract: An embodiment of the invention includes a device including at least one probe for delivering an electrical shock to a subject when the probe is in physical contact with the subject. A power source is connected to the probe for providing electrical power to the probe upon actuation of a trigger. The device further includes a medical device sensor for detecting signals emitted from a medical device present in the subject. In at least one embodiment, an alarm is connected to the medical device sensor, wherein the alarm provides an audio and/or a visual alert when the medical device sensor detects signals emitted from the medical device. In at least one embodiment, an override mechanism is connected to the medical device sensor, wherein the override mechanism prevents actuation of the trigger when the medical device sensor detects signals emitted from the medical device.
    Type: Application
    Filed: February 8, 2011
    Publication date: August 9, 2012
    Applicant: International Business Machines Corporation
    Inventors: John G. Musial, Abhinay R. Nagpal, Sandeep R. Patil, Dhaval K. Shah
  • Patent number: 8229901
    Abstract: A method, a system, and a computer program product are provided for data management. The method may comprise identifying a predefined set of data storage parameters and a predefined set of data scrubbing parameters. The method further may comprise determining the predefined set of data scrubbing parameters for first data in a first data storage based on the predefined set of data storage parameters for the first data and performing data scrubbing for the first data using the determined predefined set of data scrubbing parameters. Furthermore, the method may comprise comparing first data in the first data storage and corresponding second data in a second data storage. If a mismatch is determined between the first data and the second data, the method further may comprise synchronizing the first data with the second data as a result of the comparison.
    Type: Grant
    Filed: September 4, 2010
    Date of Patent: July 24, 2012
    Assignee: International Business Machines Corporation
    Inventors: Abhinay R. Nagpal, Sandeep R. Patil, Dhaval K. Shah, Yan W. Stein
  • Publication number: 20120131480
    Abstract: A virtual machine snapshot mechanism takes snapshots of virtual machines on a computer system, generates relationships between a snapshot and resources on the computer system, and provides a graphical display of one or more snapshots that allow visually determining which snapshots include which resources. A user may search the snapshots based on user-specified criteria. If an exact match is not available, and closest match is identified in the graphical display.
    Type: Application
    Filed: November 24, 2010
    Publication date: May 24, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael T. Kalmbach, Dhaval K. Shah
  • Publication number: 20120059803
    Abstract: A method, a system, and a computer program product are provided for data management. The method may comprise identifying a predefined set of data storage parameters and a predefined set of data scrubbing parameters. The method further may comprise determining the predefined set of data scrubbing parameters for first data in a first data storage based on the predefined set of data storage parameters for the first data and performing data scrubbing for the first data using the determined predefined set of data scrubbing parameters. Furthermore, the method may comprise comparing first data in the first data storage and corresponding second data in a second data storage. If a mismatch is determined between the first data and the second data, the method further may comprise synchronizing the first data with the second data as a result of the comparison.
    Type: Application
    Filed: September 4, 2010
    Publication date: March 8, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: ABHINAY R. NAGPAL, SANDEEP R. PATIL, DHAVAL K. SHAH, YAN W. STEIN
  • Publication number: 20110161121
    Abstract: A method, system, and article for management of travel and travel related matters. Both a source and a designation are selected, together with the associated departure and arrival information and the mode of transportation. A geographic region affected by a health related event is identified, and then employed to determine if a craft in support of the selected travel has been or is intended to be in the identified region. Exposure to the identified health related event may be mitigated by supporting an amendment to the mode of transportation.
    Type: Application
    Filed: December 25, 2009
    Publication date: June 30, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Abhinay R. Nagpal, Sandeep Ramesh Patil, Dhaval K. Shah, Yan W. Stein
  • Publication number: 20110155802
    Abstract: A device, a system, and methods of securing an authentication device are disclosed. A security system includes an authentication device configured for transmitting a second signal to deactivate the authentication device, in response to receiving a first signal. The authentication device further includes a receiver, a transmitter, an activation device, and a power source, and wherein the second signal includes a unique identifier of the authentication device. The security system further includes an authentication device reader configured for receiving the second signal from the authentication device, extracting the unique identifier from the second signal, and transmitting the extracted unique identifier.
    Type: Application
    Filed: December 24, 2009
    Publication date: June 30, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dhaval K. Shah, Gaurav Chhaunker, Vikram B. Sanap
  • Publication number: 20100324751
    Abstract: An apparatus, system, and method are disclosed for distributing data requests between data centers. A request module receives a data operation request from a client. The data operation request corresponds to mirrored data stored at a plurality of data centers. A metadata module maintains a set of data center cooling efficiency factors for each of the plurality of data centers. Each data center cooling efficiency factor comprises data relating to operational costs of a data center. A cost reduction module compares sets of data center cooling efficiency factors for each of the plurality of data centers to select the most efficient data center from the plurality of data centers. A response module sends the data operation request to the selected data center.
    Type: Application
    Filed: June 17, 2009
    Publication date: December 23, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Abhinay R. Nagpal, Sandeep R. Patil, Dhaval K. Shah, Yan W. Stein
  • Publication number: 20100156909
    Abstract: Disclosed is a computer implemented method, computer program product, and apparatus to decorate visible attributes of a rendered avatar. A server may collect a first user profile of a first avatar, the first user profile having at least one interest of a user. Next, the server may receive a location of the first avatar, wherein the location is associated with a view to at least a second avatar. The server can identify the second avatar among a group of avatars visible with respect to the first avatar. Further, the server may read a target profile of the second avatar then determine whether the second user profile satisfies a criterion based on the first user profile and the target profile. In addition, the server may render a modified rendered avatar to a client, responsive to the determination that the target profile satisfies the criterion.
    Type: Application
    Filed: December 19, 2008
    Publication date: June 24, 2010
    Applicant: International Business Machines Corporation
    Inventors: Dwip N. Banerjee, Aditya Mohan, Sandeep R. Patil, Dhaval K. Shah
  • Publication number: 20100011320
    Abstract: The present disclosure is directed to a method for allowing a user to configure shortcut keys to a specific application.
    Type: Application
    Filed: July 11, 2008
    Publication date: January 14, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ankur B. Shah, Dhaval K. Shah, Phong A. Pham
  • Patent number: 7502831
    Abstract: An embodiment provides a flexible way to categorize instant messages (IM) or instant data by segmenting them. The default category would be viewable and/or readable as currently is with no change. However, those categories which are categorized as CONFIDENTIAL and/or PERSONAL would be displayed in a hidden form. The invention is demonstrated using a CONFIDENTIAL category; however, the invention is not limited to just CONFIDENTIAL category as it can be applied to other categories as well, such as INFORMATIONAL. An embodiment of the invention allows users to view CONFIDENTIAL informational in private and data would be hidden on the receiving end until a request to un-hide is made by the receiver.
    Type: Grant
    Filed: March 10, 2008
    Date of Patent: March 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: Mike V. Macias, Salil Pradeep Gandhi, Saidas Tukaram Kottawar, Dhaval K. Shah, Sandip Dnyaneshwar Mahajan
  • Publication number: 20090029679
    Abstract: A call response time program in the memory of a server computer interacts with a mobile phone communication program to give a caller a likely response time when the call has been missed. The software comprises a configuration program, a call analyzer program, a message program, and a billing program. Auto profiling may be selected and an artificial intelligence program can be invoked. The configuration program creates a plurality of user profiles and a plurality of message files. The call analyzer program creates a plurality of user histories and may optionally invoke the artificial intelligence program. The message program responds to a missed call by sending an appropriate message indicating a likely response time. Alternatively, an interactive voice response system (IVRS) may be used.
    Type: Application
    Filed: July 25, 2007
    Publication date: January 29, 2009
    Inventors: Teng Hu, Dhaval K. Shah, Ankur Bk Shah, Ganesh Sivamani