Patents by Inventor Gandhi Sivakumar

Gandhi Sivakumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9213582
    Abstract: Embodiments of the present invention provide an approach for differentiated service identification/exposure in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, input model criteria will be generated. Such criteria may (among other things): identify service categories based on contextual bindings and domain centric functions; identify inter-service dependencies for a given business model (BPM); and/or provide dynamic validation of services to be exposed/identified. Embodiments of the present invention may further analyze service exposure criteria to provide efficient and accurate service exposure decisions as well as validation of the service exposure. This approach allows for consistent service exposure determinations based on decision histories of similarly (2-dimensional) aligned services in the past.
    Type: Grant
    Filed: April 26, 2012
    Date of Patent: December 15, 2015
    Assignee: International Business Machines Corporation
    Inventors: Nanjangud C. Narendra, Karthikeyan Ponnalagu, Gandhi Sivakumar
  • Patent number: 9213674
    Abstract: A method, system, and/or computer program product enables the sharing of memory among mobile devices. Copies of a same hard key holder are installed in multiple mobile devices. The hard key holder controls memory sharing between a master mobile device and a slave mobile device. A memory appropriation request is sent from the master mobile device to the slave mobile device. In response to the slave mobile device receiving the memory appropriation request, an unused sector of the memory in the slave mobile device is reserved for use by the master mobile device. Upon storing of data sent from the master mobile device, a message is sent from the slave mobile device to the master mobile device describing how much room is still available for the master mobile device to use.
    Type: Grant
    Filed: March 25, 2015
    Date of Patent: December 15, 2015
    Assignee: International Business Machines Corporation
    Inventors: Faried Abrahams, Sandeep R. Patil, Piyush Sarwal, Riyazahamad M. Shiraguppi, Gandhi Sivakumar
  • Publication number: 20150356095
    Abstract: A computer receives a request for customization of a first data domain, of an organization, to be analyzed. The computer receives selection of the first data domain and a second data domain of the organization, a first data fulfillment element, and a linkage between the first data fulfillment element and one or both of the first data domain and the second data domain. The computer generates an improved data governance policy based, at least in part, on the first data domain, the second data domain, the first data fulfillment element, the linkage, and a characteristic of the organization. The computer identifies one or more differences between a current data governance policy associated with one or both of the first data domain and the second data domain and an improved data governance policy that is associated with one or both of the first data domain and the second data domain.
    Type: Application
    Filed: June 9, 2014
    Publication date: December 10, 2015
    Inventors: Dale Davis Jones, Shankar S. Kalyana, Gandhi Sivakumar
  • Publication number: 20150332056
    Abstract: An approach is provided for protecting data owned by an operating system on a mobile computing device having multiple operating systems. A map specifying protected data regions for the operating systems on the mobile computing device is generated. At least a portion of the map is secured with a shared key. Based on the map and the shared key, and in response to a data cleanup activity being performed by a software utility being executed on another, currently running operating system included in the multiple operating systems, a data region included in the protected data regions is determined to be owned by the operating system. Based on the data region being owned by the operating system and the data region being specified by the map, the data cleanup activity is blocked from being performed on the data region owned by the operating system.
    Type: Application
    Filed: May 15, 2014
    Publication date: November 19, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Blaine H. Dolph, Miku K. Jha, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar
  • Patent number: 9152325
    Abstract: One method includes assigning a pointer from multiple logical blocks to the same original physical block if the multiple logical blocks include the same data. The method further includes receiving a command to write data to the first logical block and determining if the first logical block is a frequently accessed logical block. If the first logical block is a frequently accessed logical block, ownership of the original physical block is assigned to the first logical block. If ownership is established, the method includes copying any data stored in the original physical block to a new physical block, assigning a pointer from a second logical block to the new physical block, and performing the write command on the original physical block. A system includes a processor for performing the above method. One computer program product includes computer code for performing the method described above.
    Type: Grant
    Filed: July 26, 2012
    Date of Patent: October 6, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rezaul Shah Mohammad Islam, Sandeep Ramesh Patil, Riyazahamad Moulasab Shiraguppi, Gandhi Sivakumar
  • Publication number: 20150254156
    Abstract: Systems and methods for providing information security in a network environment. The method includes receiving a user selection of a data section recorded on a storage system. The method further includes determining a monitoring routine for the data section. The method further includes determining a physical location at which the data section is recorded in the storage system. The method further includes monitoring the physical location for faults according to the monitoring routine.
    Type: Application
    Filed: May 19, 2015
    Publication date: September 10, 2015
    Inventors: Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar, Matthew A. Terry, Matthew B. Trevathan
  • Publication number: 20150256548
    Abstract: Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file system is created, and one or more file system protection commands are invoked that restrict access to the snapshot of the file set. Generating the snapshot and restricting access to the snapshot data may include immediately opening an administrative shell for the file-system in response to identifying a potential breach, and executing administrative shell commands that invoke creation of snapshot and limit access of the snapshot data to an administrator or super user.
    Type: Application
    Filed: May 21, 2015
    Publication date: September 10, 2015
    Inventors: Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar, Matthew B. Trevathan
  • Publication number: 20150215341
    Abstract: A method, a system, and a computer program product are provided for reducing message passing for contention detection in distributed SIP server environments. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine that a first site is waiting for a first object locked by a second site. The programming instructions are further operable to determine that a third site is waiting for a second object locked by the first site, and to send a first probe to the second site to determine whether the second site is waiting. A second probe is received and indicates that a site is waiting for an object locked by the first site. The second probe further indicates a deadlock in a distributed server environment to be resolved.
    Type: Application
    Filed: January 28, 2015
    Publication date: July 30, 2015
    Inventors: Abhinay R. Nagpal, Sandeep R. Patil, Sri Ramanathan, Gandhi Sivakumar, Matthew B. Trevathan
  • Publication number: 20150199297
    Abstract: A method, system, and/or computer program product enables the sharing of memory among mobile devices. Copies of a same hard key holder are installed in multiple mobile devices. The hard key holder controls memory sharing between a master mobile device and a slave mobile device. A memory appropriation request is sent from the master mobile device to the slave mobile device. In response to the slave mobile device receiving the memory appropriation request, an unused sector of the memory in the slave mobile device is reserved for use by the master mobile device. Upon storing of data sent from the master mobile device, a message is sent from the slave mobile device to the master mobile device describing how much room is still available for the master mobile device to use.
    Type: Application
    Filed: March 25, 2015
    Publication date: July 16, 2015
    Inventors: FARIED ABRAHAMS, SANDEEP R. PATIL, PIYUSH SARWAL, RIYAZAHAMAD M. SHIRAGUPPI, GANDHI SIVAKUMAR
  • Publication number: 20150193239
    Abstract: An approach is provided for operating a mobile device having first and second operating systems (OSs) installed. While the mobile device is executing the first OS but not the second OS, (1) based in part on battery power remaining in the mobile device being less than a threshold and a lower power consumption of the mobile device if executing the second OS but not the first OS, execution of the first OS is terminated and the second OS is executed in the mobile device; and/or (2) based in part on (a) the mobile device being currently located in the first geographic region which has a greater likelihood of attack on the mobile device, and (b) the mobile device being more secure while operating the second OS but not the first OS, execution of the first OS is terminated and the second OS is executed in the mobile device.
    Type: Application
    Filed: January 9, 2014
    Publication date: July 9, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Blaine H. Dolph, Miku K. Jha, Sandeep R. Patil, Gandhi Sivakumar, Riyazahamad M. Shiraguppi
  • Patent number: 9069955
    Abstract: Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file system is created, and one or more file system protection commands are invoked that restrict access to the snapshot of the file set. Generating the snapshot and restricting access to the snapshot data may include immediately opening an administrative shell for the file-system in response to identifying a potential breach, and executing administrative shell commands that invoke creation of snapshot and limit access of the snapshot data to an administrator or super user.
    Type: Grant
    Filed: April 30, 2013
    Date of Patent: June 30, 2015
    Assignee: International Business Machines Corporation
    Inventors: Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar, Matthew B. Trevathan
  • Patent number: 9063966
    Abstract: Systems and methods for providing information security in a network environment. The method includes receiving a user selection of a data section recorded on a storage system. The method further includes determining a monitoring routine for the data section. The method further includes determining a physical location at which the data section is recorded in the storage system. The method further includes monitoring the physical location for faults according to the monitoring routine.
    Type: Grant
    Filed: February 1, 2013
    Date of Patent: June 23, 2015
    Assignee: International Business Machines Corporation
    Inventors: Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar, Matthew A. Terry, Matthew B. Trevathan
  • Publication number: 20150169222
    Abstract: Dynamic allocation of memory in a hybrid system is provided. In particularly, a method and system is provided to leverage a hybrid infrastructure for dynamic memory allocation and persistent file storage. The method includes a method comprises dynamically allocating a file or its part or to cache a file or its part between different storage technologies and respective memory technologies in a hybrid infrastructure.
    Type: Application
    Filed: February 25, 2015
    Publication date: June 18, 2015
    Inventors: Bhushan P. JAIN, Sandeep R. PATIL, Sri RAMANATHAN, Gandhi SIVAKUMAR, Matthew B. TREVATHAN
  • Publication number: 20150160943
    Abstract: An approach for specifying data in a standards style pattern of Service-Oriented Architecture (SOA) environments is provided. The approach implemented in a computer infrastructure, includes defining an interface including one or more local data elements and one or more references to one or more common data elements, of a service, the one or more common data elements being defined in a library for a plurality of services. The approach further includes configuring a data definition file (DDF) which indicates whether each of the one or more local data elements and the one or more common data elements is mandatory for the service. The approach further includes validating one or more data elements from a consumer as mandatory for the service based on the configured DDF.
    Type: Application
    Filed: February 10, 2015
    Publication date: June 11, 2015
    Inventors: Sreekanth R. IYER, Sandeep R. PATIL, Sri RAMANATHAN, Gandhi SIVAKUMAR, Matthew B. TREVATHAN
  • Patent number: 9049214
    Abstract: A method, system, and/or computer program product enables the sharing of memory among mobile devices. Copies of a same hard key holder are installed in all mobile devices from a user-defined group of mobile devices. The hard key holder controls memory sharing between a master mobile device and a slave mobile device. A memory appropriation request is sent from the master mobile device to the slave mobile device. In response to the slave mobile device receiving the memory appropriation request, an unused sector of the memory in the first slave mobile device is reserved for use by the master mobile device. Upon storing of data sent from the master mobile device, a message is sent from the slave mobile device to the master mobile device describing how much room is still available for the master mobile device to use.
    Type: Grant
    Filed: November 21, 2013
    Date of Patent: June 2, 2015
    Assignee: International Business Machines Corporation
    Inventors: Faried Abrahams, Sandeep R. Patil, Piyush Sarwal, Riyazahamad M. Shiraguppi, Gandhi Sivakumar
  • Publication number: 20150142885
    Abstract: A method, system, and/or computer program product enables the sharing of memory among mobile devices. Copies of a same hard key holder are installed in all mobile devices from a user-defined group of mobile devices. The hard key holder controls memory sharing between a master mobile device and a slave mobile device. A memory appropriation request is sent from the master mobile device to the slave mobile device. In response to the slave mobile device receiving the memory appropriation request, an unused sector of the memory in the first slave mobile device is reserved for use by the master mobile device. Upon storing of data sent from the master mobile device, a message is sent from the slave mobile device to the master mobile device describing how much room is still available for the master mobile device to use.
    Type: Application
    Filed: November 21, 2013
    Publication date: May 21, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: FARIED ABRAHAMS, SANDEEP R. PATIL, PIYUSH SARWAL, RIYAZAHAMAD M. SHIRAGUPPI, GANDHI SIVAKUMAR
  • Publication number: 20150142752
    Abstract: A method and system for determining priority is provided. The method includes generating a list defining specified data objects stored within a back-up/archived data storage system and applying importance levels to the specified data objects. Reliability urgency levels for the storage devices are determined and in response groups of data objects of the specified data objects are generated. Required reliability levels for each group of data objects are determined and associated erasure encoding rates are calculated. Fragment sets for the groups of data objects are generated and numbers of parity objects required for the fragment sets are determined. An erasure code algorithm is executed with respect to the groups of data objects and in response parity objects are computed on demand.
    Type: Application
    Filed: November 15, 2013
    Publication date: May 21, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ramamohan Chennamsetty, Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar
  • Publication number: 20150134788
    Abstract: A system, method and program product for managing profiles for devices in a network. A computer system is disclosed having a configuration management system for managing configuration profiles for a set of devices within a network, and includes: a boundary definition system that employs a computerized process for defining a plurality of geospatial boundaries; a device manager that employs a computerized process for interfacing with remote agents associated with respective devices to recognize when a device has migrated into a new geospatial boundary; and a profile management system that employs a computerized process for uploading an updated configuration profile to the remote agent in response to the device being migrated to the new geospatial boundary.
    Type: Application
    Filed: November 13, 2013
    Publication date: May 14, 2015
    Applicant: International Business Machiness Corporation
    Inventors: Shankar S. Kalyana, Jigneshkumar K. Karia, Gandhi Sivakumar
  • Publication number: 20150112987
    Abstract: A method and associated system for generating a service specification of a Service Oriented Architecture (SOA) solution. Each process of at least one process is decomposed into at least one atomic service process. The service specification of the SOA solution to be compatible with both a process model framework that includes the at least one process and a data model framework that includes at least one data element that is indirectly matched to the at least one process. The service specification represents a respective process interface of each atomic service process that performs a respective atomic service in the SOA solution. The customized service specification is stored in a database.
    Type: Application
    Filed: January 2, 2015
    Publication date: April 23, 2015
    Inventors: Faried Abrahams, Kerard R. Hogg, Kent R. Ramchand, Gandhi Sivakumar
  • Patent number: 9009392
    Abstract: Dynamic allocation of memory in a hybrid system is provided. In particular, a method and system is provided to leverage a hybrid infrastructure for dynamic memory allocation and persistent file storage. The method includes dynamically allocating a file or its part or to cache a file or its part between different storage technologies and respective memory technologies in a hybrid infrastructure.
    Type: Grant
    Filed: April 25, 2012
    Date of Patent: April 14, 2015
    Assignee: International Business Machines Corporation
    Inventors: Bhushan P. Jain, Sandeep R. Patil, Sri Ramanathan, Gandhi Sivakumar, Matthew B. Trevathan