Patents by Inventor Dinesh C. Verma

Dinesh C. Verma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7912968
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.
    Type: Grant
    Filed: August 29, 2007
    Date of Patent: March 22, 2011
    Assignee: International Business Machines Corporation
    Inventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
  • Publication number: 20100311443
    Abstract: Methods and systems for accessing computer network accessible services, such as internet based service applications, via a mobile terminal of a mobile telecommunication system using a mediation layer between a person's mobile terminal and the IT world. The mobile terminal in response to receiving user inputs interacts with this mediation layer via text messages. The mediation layer turns around and executes the appropriate IT services on behalf of the mobile terminal user.
    Type: Application
    Filed: June 5, 2009
    Publication date: December 9, 2010
    Inventors: Tamer E. Abuelsaad, Kelly Abuelsaad, Dinesh C. Verma
  • Patent number: 7787456
    Abstract: Disclosed is a technique for correcting a configuration problem. The configuration problem is detected. It is determined whether there is at least one solution for the configuration problem in a knowledge data store. When it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem. When said solution can be automatically applied, automatically applying said solution. When said solution cannot be automatically applied, notifying a user.
    Type: Grant
    Filed: May 9, 2008
    Date of Patent: August 31, 2010
    Assignee: International Business Machines Corporation
    Inventors: Cuong Minh Le, David Michael Shackelford, Gregory Edward McBride, James Mitchell Ratliff, Kaladhar Voruganti, Sandeep Gopisetty, Robert Beverley Basham, Dinesh C. Verma, Kang-Won Lee, Dakshi Agrawal, Brent William Yardley, Khalid Filali-Adib
  • Patent number: 7788353
    Abstract: A technique for performing configuration checking of a network is provided. A network data store is scanned for at least one transaction. At least one event is generated for the transaction. At least one configuration policy is associated with the event. The configuration policy is compared with configuration data associated with the event. It is determined whether the configuration policy has been violated based on the comparison.
    Type: Grant
    Filed: May 9, 2008
    Date of Patent: August 31, 2010
    Assignee: International Business Machines Corporation
    Inventors: Cuong Minh Le, David Michael Shackelford, Gregory Edward McBride, James Mitchell Ratliff, Kaladhar Voruganti, Sandeep Gopisetty, Robert Beverley Basham, Dinesh C. Verma, Kang-Won Lee, Dakshi Agrawal, Brent William Yardley, Khalid Filali-Adib
  • Publication number: 20090313329
    Abstract: Methods, systems and computer program products for document sharing in collaborative electronic meetings. Exemplary embodiments include a method for control of documents in a collaborative interaction, the method including establishing an out-of-band channel between a first participant and a second participant in the collaborative interaction, transferring a copy of a document on the out-of-band channel between the first participant and the second participant, transferring a command issued on the document by the first participant on an in-band channel established between the first participant and the second participant, invoking the command by the second participant on the copy of the document by the second participant and displaying the result of invoking the command to the second participant.
    Type: Application
    Filed: June 13, 2008
    Publication date: December 17, 2009
    Applicant: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Dinesh C. Verma
  • Publication number: 20090141659
    Abstract: A method, system and computer-usable medium are disclosed for discovering the topology of a network by using multiple discovery agents operating in parallel. A NodeList containing information about known nodes in a target network is received. The number (‘K’) of discovery agents to be used is determined, where 1<=K<=TotalNumberOfNodes). The nodes are partitioned into node groups, each of which has a group identifier respectively assigning it to a discovery agent ‘M’ where 1<=M<=K. A GraphList is created to hold information about known and discovered nodes. Each entry in the NodeList list is processed by its assigned discovery agent ‘M’, which sends probe messages to the target node to determine the node identifiers of discovered neighboring nodes. If the discovered nodes are not listed in the NodeList, then they are assigned to a node group for processing. If the connections between the target and the discovered neighboring node nodes are not listed in the GraphList, then they are added.
    Type: Application
    Filed: December 3, 2007
    Publication date: June 4, 2009
    Inventors: Daniel Joseph Martin, Dinesh C. Verma
  • Publication number: 20090063673
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.
    Type: Application
    Filed: August 29, 2007
    Publication date: March 5, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
  • Publication number: 20090055274
    Abstract: This invention provides methods and apparatus for executing applications in a distributed manner employing one or more proxy servers and one origin server. The invention allows the applications to be executed primarily at the proxy servers rather than at the origin servers, thereby gaining in scalability and improved user response time. A redirection mechanism is used to direct requests to one of the proxy servers. The proxy server uses caching techniques to bring information records needed for application execution to the proxy servers. The code required for application execution is also obtained from the origin server. The invention discusses applying this technique to three Web-based applications, namely Web-based auctions, generating personalized content for Web-users, and creating advertisements for users accessing a Web page.
    Type: Application
    Filed: October 29, 2008
    Publication date: February 26, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, Anees A. Shaikh, Renu Tewari, Dinesh C. Verma
  • Patent number: 7490265
    Abstract: A solution for managing a computer infrastructure is provided. In particular, the solution can generate a set of tentative recovery segments for the computer infrastructure based on a related resource graph and a set of partition rules. The related resource graph can be generated based on a managed resource graph, which includes resource type information for each node in the managed resource graph. The set of tentative recovery segments can be used to manage the computer infrastructure and/or a set of recovery segments, which includes recovery characteristic(s) for each segment can be generated based on the set of tentative recovery segments and a set of recovery segment templates. In any event, the invention provides a solution that fully and/or partially automates the identification of recovery segments within a computer infrastructure, thereby enabling a more effective management of the computer infrastructure.
    Type: Grant
    Filed: May 10, 2006
    Date of Patent: February 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: Michael E. Baskey, Chun-Shi Chang, Lap T. Huynh, Dinakaran Joseph, Sambit Sahu, Dinesh C. Verma, Michael D. Williams
  • Publication number: 20090031302
    Abstract: Risks of change to a physical configuration are minimized. A request for a change to the physical system included in the physical configuration is detected, and all applications the physical systems that would be affected by the requested change are identified. All the applications and physical systems that would be affected by the requested change are replicated on a virtual system, including applications and the physical system to which the requested change is targeted and applications and physical systems that are dependent on the applications and the physical system to which the requested change is targeted. The requested change is applied to the virtual system. The virtual system is tested to determine whether the applied change produces desired results. If the applied change products the desired results, the requested change is applied to the physical system.
    Type: Application
    Filed: July 24, 2007
    Publication date: January 29, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mandis S. Beigi, James E. Hanson, Parviz Kermani, Dinesh C. Verma
  • Patent number: 7447731
    Abstract: This invention provides methods and apparatus for executing applications in a distributed manner employing one or more proxy servers and one origin server. The invention allows the applications to be executed primarily at the proxy servers rather than at the origin servers, thereby gaining in scalability and improved user response time. A redirection mechanism is used to direct requests to one of the proxy servers. The proxy server uses caching techniques to bring information records needed for application execution to the proxy servers. The code required for application execution is also obtained from the origin server. The invention discusses applying this technique to three Web-based applications, namely Web-based auctions, generating personalized content for Web-users, and creating advertisements for users accessing a Web page.
    Type: Grant
    Filed: December 17, 2002
    Date of Patent: November 4, 2008
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Anees A. Shaikh, Renu Tewari, Dinesh C. Verma
  • Publication number: 20080271004
    Abstract: A computer-implemented method, system, and program product for optimizing a distributed (software) application are provided. Specifically, a configuration of a target computing environment, in which the distributed application is deployed, is discovered upon deployment of the distributed application. Thereafter, based on a set of rules and the discovered configuration, one or more optimization techniques are applied to optimize the distributed application. In a typical embodiment, the set of rules can be embedded in the distributed application, or they can be accessed from an external source such as a repository.
    Type: Application
    Filed: July 3, 2008
    Publication date: October 30, 2008
    Inventors: Jong-Deok Choi, Manish Gupta, Parviz Kermani, Kang-Won Lee, Kyung Dong Ryu, Dinesh C. Verma, Peng Wu
  • Publication number: 20080222704
    Abstract: Techniques are provided for computer network security. The techniques include obtaining operational data for at least a first networked application; obtaining enterprise data for at least a second networked application; correlating the operational data with the enterprise data to obtain correlated data; and using the correlated data to improve security of the computer network.
    Type: Application
    Filed: May 19, 2008
    Publication date: September 11, 2008
    Applicant: International Business Machines Corporation
    Inventors: John Reumann, Dinesh C. Verma
  • Publication number: 20080209015
    Abstract: A technique for performing configuration checking of a network is provided. A network data store is scanned for at least one transaction. At least one event is generated for the transaction. At least one configuration policy is associated with the event. The configuration policy is compared with configuration data associated with the event. It is determined whether the configuration policy has been violated based on the comparison.
    Type: Application
    Filed: May 9, 2008
    Publication date: August 28, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Cuong Minh Le, David Michael Shackelford, Gregory Edward McBride, James Mitchell Ratliff, Kaladhar Voruganti, Sandeep Gopisetty, Robert Beverley Basham, Dinesh C. Verma, Kang-Won Lee, Dakshi Agrawal, Brent William Yardley, Khalid Filali-Adib
  • Publication number: 20080205300
    Abstract: Disclosed is a technique for correcting a configuration problem. The configuration problem is detected. It is determined whether there is at least one solution for the configuration problem in a knowledge data store. When it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem. When said solution can be automatically applied, automatically applying said solution. When said solution cannot be automatically applied, notifying a user.
    Type: Application
    Filed: May 9, 2008
    Publication date: August 28, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Cuong Minh Le, David Michael Shackelford, Gregory Edward McBride, James Mitchell Ratliff, Kaladhar Voruganti, Sandeep Gopisetty, Robert Beverley Basham, Dinesh C. Verma, Kang-Won Lee, Dakshi Agrawal, Brent William Yardley, Khalid Filali-Adib
  • Patent number: 7406540
    Abstract: This invention provides methods and apparatus for web switching without connection termination while providing content routing functionality. Content-aware web switches terminate incoming TCP connections and inspect the HTTP header to recognize the URL (content) being requested from a web server farm. This invention maps application layer information (URLs) to MPLS labels. This allows a standard MPLS switch to provide web switching functionality without terminating TCP connections. In addition to content routing, this method is applied for client session affinity, server load balancing and service differentiation. This invention also relates to using TCP port numbers instead of MPLS labels to achieve web-switching functionality through the use of a TCP router that translates IP address and port numbers.
    Type: Grant
    Filed: April 19, 2007
    Date of Patent: July 29, 2008
    Assignee: International Business Machines Corporation
    Inventors: Arup Acharya, Anees A. Shaikh, Renu Tewari, Dinesh C. Verma
  • Publication number: 20080172741
    Abstract: Techniques are provided for detecting computer fraud. The techniques include obtaining a text version of a candidate destination and a graphical rendering of the candidate destination, comparing the text version of the candidate destination and the graphical rendering of the candidate destination with a corresponding text version of a stored destination and a corresponding graphical rendering of the stored destination, and generating a fraud warning if the graphical rendering of the candidate destination is substantially similar to the graphical rendering of the stored destination while the text version of the candidate destination differs substantially from the corresponding text version of the stored destination.
    Type: Application
    Filed: January 16, 2007
    Publication date: July 17, 2008
    Applicant: International Business Machines Corporation
    Inventors: John Reumann, Dinesh C. Verma
  • Patent number: 7397770
    Abstract: A technique for performing configuration checking of a network is provided. A network data store is scanned for at least one transaction. At least one event is generated for the transaction. At least one configuration policy is associated with the event. The configuration policy is compared with configuration data associated with the event. It is determined whether the configuration policy has been violated based on the comparison.
    Type: Grant
    Filed: February 20, 2004
    Date of Patent: July 8, 2008
    Assignee: International Business Machines Corporation
    Inventors: Cuong Minh Le, David Michael Shackelford, Gregory Edward McBride, James Mitchell Ratliff, Kaladhar Voruganti, Sandeep Gopisetty, Robert Beverley Basham, Dinesh C. Verma, Kang-Won Lee, Dakshi Agrawal, Brent William Yardley, Khalid Filali-Adib
  • Publication number: 20080047019
    Abstract: Techniques are provided for computer network security. The techniques include obtaining operational data for at least a first networked application; obtaining enterprise data for at least a second networked application; correlating the operational data with the enterprise data to obtain correlated data; and using the correlated data to improve security of the computer network.
    Type: Application
    Filed: August 16, 2006
    Publication date: February 21, 2008
    Applicant: International Business Machines Corporation
    Inventors: John Reumann, Dinesh C. Verma
  • Publication number: 20070299746
    Abstract: The present invention discloses a convergence tool for analyzing an information technology infrastructure that integrates network performance, quality of experience (QOE), and anticipated financial return parameters, which are interdependent on one another. One aspect of the invention includes a method including a step of identifying an information technology infrastructure configuration having an estimated subscriber load resulting from at least one service provided over the infrastructure. Performance metrics for the infrastructure can be computed based upon the subscriber load. Quality of experience metrics for subscribers receiving the service via the infrastructure can be determined based in part upon the computed performance metrics. Financial metrics can be calculated that are based in part upon an expected subscriber population, which is based in part upon the determined quality of experience metrics. The expected subscriber population can be used to adjust the estimated subscriber load.
    Type: Application
    Filed: June 22, 2006
    Publication date: December 27, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: MICHAEL R. HALEY, DINESH C. VERMA