Patents by Inventor Hariharan Krishna
Hariharan Krishna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220398288Abstract: In an approach to improve recommendation generating through IoT devices, embodiments abstract specific messaging formats from various IoT devices, map, the abstracted messaging formats to a canonical model associated to device types using based on collected IoT device data, and determine a context of data received from the plurality of IoT devices based on the type of IoT device and historical trend analysis of canonical data points from similar device types. Further, embodiments derive an association between data points among the plurality of IoT devices in a solution, determine one or more contexts of the established data point associations in the solution, and recommend one or more charts, events, and associated data based on a derived context and a visualization map. Additionally, embodiments output, by a user interface, the recommended chart events and associated data.Type: ApplicationFiled: June 14, 2021Publication date: December 15, 2022Inventors: Dinesh G. Venkatraman, Hariharan N. Venkitachalam, Alankar Srivastava, D Krishna Vinci
-
Patent number: 11477293Abstract: A method for migrating an application includes representing the application as a vector including metadata about the application and at least one customer constraint, scoring a deviation of data consistency for the application related to each of a plurality of clouds, including a cloud in which the application is currently deployed and a plurality of potential target clouds, selecting one of the potential target clouds based on the scoring, wherein the selected cloud has an improved score over the cloud in which the application is current deployed, and migrating the application to the selected cloud.Type: GrantFiled: February 19, 2021Date of Patent: October 18, 2022Assignee: International Business Machines CorporationInventors: Sudheesh S. Kairali, Abhinav Gupta, Abhishek Seth, Shajeer K Mohammed, Hariharan Krishna
-
Publication number: 20220292032Abstract: Disclosed embodiments provide features for the architecture of microservices. A global context cache is created for a microservice environment that is accessible from multiple deployed microservices. Data from various customers/applications can be aggregated to establish a determination of when a read or write access would fail due to permissions, and/or other condition such as existence or non-existence of certain data. In such situations, an error can be returned from the global context cache in much less time than if the access request propagated throughout the computer network to the persistent storage.Type: ApplicationFiled: March 11, 2021Publication date: September 15, 2022Inventors: Hariharan Krishna, Shajeer K Mohammed, Sudheesh S. Kairali
-
Patent number: 11435874Abstract: The present disclosure describes methods and systems for a document server communicatively coupled to at least one client computing device, a document comprising an operation log, wherein the operation log comprises at least one first sequential operation defining operations to create data values of the document, a document object model, wherein the document is at least partially positioned on at least one of the document server and a first client computing device of the at least one client computing device, and a formula engine, wherein the formula engine is structured to determine a calculation definition in response to the user formula value and the document object model.Type: GrantFiled: November 20, 2020Date of Patent: September 6, 2022Assignee: Coda Project, Inc.Inventors: Melissa Ming-Sak Boucher, Jeremy Edward Britton, Luke Bayes, Monica F. Caso, Alexander W. Deneui, Christopher Leland Eck, Nigel Robin Ellis, Filipe P. Fortes, David Lilja Greenspan, Brett Robert Hobbs, Matthew B. Hudson, Timothy Andrew James, Kenneth Francis Mendes, Shishir S. Mehrotra, Trevor Michael O'Brien, Lane Patrick Shackleton, Rhed Shi, Hariharan Sivaramakrishnan, Jason Peter Stowe, Jason Andrew Tamulonis, Himanshu Vasishth, Ramesh Krishna Vyaghrapuri, David Richard Wright, Irvin Zhan, Roger Mathieu Zurawicki
-
Publication number: 20220272157Abstract: A method for migrating an application includes representing the application as a vector including metadata about the application and at least one customer constraint, scoring a deviation of data consistency for the application related to each of a plurality of clouds, including a cloud in which the application is currently deployed and a plurality of potential target clouds, selecting one of the potential target clouds based on the scoring, wherein the selected cloud has an improved score over the cloud in which the application is current deployed, and migrating the application to the selected cloud.Type: ApplicationFiled: February 19, 2021Publication date: August 25, 2022Inventors: Sudheesh S. Kairali, Abhinav Gupta, Abhishek Seth, Shajeer K Mohammed, Hariharan Krishna
-
Patent number: 11188984Abstract: A method, computer program product, and system performing a method that includes a processor(s) obtaining a digital document defining insurance parameters for utilization by a user of a portion of computing resources selected from a group of computing resources comprising the shared computing environment. The processor(s) generates, based on the digital document, parameters defining the portion of the computing resources and risk management rules reflecting guaranteed thresholds for utilization and performance of the portion of the computing resources defined in the digital document. The processor(s) configures a controller in the shared computing environment, based on the parameters and the risk management rules and obtains a notification of a failure in the portion of the computing resources in violation of the risk management rules and details of the failure to determine the extent and impact of the failure. The processor(s) automatically generates a claim package and transmits it to the administrator.Type: GrantFiled: May 6, 2019Date of Patent: November 30, 2021Assignee: International Business Machines CorporationInventors: Albee Jhoney, Hariharan Krishna, Anbazhagan Mani, Umasuthan Ramakrishnan
-
Patent number: 11169906Abstract: Embodiments of the present invention enable users to extract knowledge from testing scenarios performed during application development, and later employ that knowledge to interpret application usage scenarios to enhance serviceability of applications by expediting identification and solving of problems. In an exemplary embodiment, log data generated during simulation of test cases is analyzed to create one or more rules based on patterns in which one or more log entries appear in the log data. Later, log data may be analyzed to look for a pattern of log entries that matches a pattern-based rule, thereby facilitating faster identification and resolution of the problem.Type: GrantFiled: February 5, 2019Date of Patent: November 9, 2021Assignee: International Business Machines CorporationInventors: Hariharan Krishna, Arun Ramakrishnan, Rohit Shetty
-
Patent number: 10652327Abstract: The present subject matter relates to migrating a virtual machine (VM) from a source server to a destination server. The migration involves computation of a suitability score for each particular server in the plurality of candidate servers. The suitability score for a server indicates the suitability of the server to host the VM. In an example implementation, the suitability score for a server is computed based on satisfaction of at least one criterion for operation of the VM by the server.Type: GrantFiled: January 6, 2017Date of Patent: May 12, 2020Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Murali Nidugala, Kalapriya Kannan, Hariharan Krishna
-
Publication number: 20190259105Abstract: A method, computer program product, and system performing a method that includes a processor(s) obtaining a digital document defining insurance parameters for utilization by a user of a portion of computing resources selected from a group of computing resources comprising the shared computing environment. The processor(s) generates, based on the digital document, parameters defining the portion of the computing resources and risk management rules reflecting guaranteed thresholds for utilization and performance of the portion of the computing resources defined in the digital document. The processor(s) configures a controller in the shared computing environment, based on the parameters and the risk management rules and obtains a notification of a failure in the portion of the computing resources in violation of the risk management rules and details of the failure to determine the extent and impact of the failure. The processor(s) automatically generates a claim package and transmits it to the administrator.Type: ApplicationFiled: May 6, 2019Publication date: August 22, 2019Inventors: Albee Jhoney, Hariharan Krishna, Anbazhagan Mani, Umasuthan Ramakrishnan
-
Patent number: 10332212Abstract: A method, computer program product, and system performing a method that includes a processor(s) obtaining a digital document defining insurance parameters for utilization by a user of a portion of computing resources selected from a group of computing resources comprising the shared computing environment. The processor(s) generates, based on the digital document, parameters defining the portion of the computing resources and risk management rules reflecting guaranteed thresholds for utilization and performance of the portion of the computing resources defined in the digital document. The processor(s) configures a controller in the shared computing environment, based on the parameters and the risk management rules and obtains a notification of a failure in the portion of the computing resources in violation of the risk management rules and details of the failure to determine the extent and impact of the failure. The processor(s) automatically generates a claim package and transmits it to the administrator.Type: GrantFiled: October 26, 2016Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: Albee Jhoney, Hariharan Krishna, Anbazhagan Mani, Umasuthan Ramakrishnan
-
Publication number: 20190171549Abstract: Embodiments of the present invention enable users to extract knowledge from testing scenarios performed during application development, and later employ that knowledge to interpret application usage scenarios to enhance serviceability of applications by expediting identification and solving of problems. In an exemplary embodiment, log data generated during simulation of test cases is analyzed to create one or more rules based on patterns in which one or more log entries appear in the log data. Later, log data may be analyzed to look for a pattern of log entries that matches a pattern-based rule, thereby facilitating faster identification and resolution of the problem.Type: ApplicationFiled: February 5, 2019Publication date: June 6, 2019Inventors: Hariharan Krishna, Arun Ramakrishnan, Rohit Shetty
-
Patent number: 10248541Abstract: Embodiments of the present invention enable users to extract knowledge from testing scenarios performed during application development, and later employ that knowledge to interpret application usage scenarios to enhance serviceability of applications by expediting identification and solving of problems. In an exemplary embodiment, log data generated during simulation of test cases is analyzed to create one or more rules based on patterns in which one or more log entries appear in the log data. Later, log data may be analyzed to look for a pattern of log entries that matches a pattern-based rule, thereby facilitating faster identification and resolution of the problem.Type: GrantFiled: January 25, 2017Date of Patent: April 2, 2019Assignee: International Business Machines CorporationInventors: Hariharan Krishna, Arun Ramakrishnan, Rohit Shetty
-
Patent number: 10235275Abstract: Embodiments of the present invention enable users to extract knowledge from testing scenarios performed during application development, and later employ that knowledge to interpret application usage scenarios to enhance serviceability of applications by expediting identification and solving of problems. In an exemplary embodiment, log data generated during simulation of test cases is analyzed to create one or more rules based on patterns in which one or more log entries appear in the log data. Later, log data may be analyzed to look for a pattern of log entries that matches a pattern-based rule, thereby facilitating faster identification and resolution of the problem.Type: GrantFiled: January 25, 2017Date of Patent: March 19, 2019Assignee: International Business Machines CorporationInventors: Hariharan Krishna, Arun Ramakrishnan, Rohit Shetty
-
Patent number: 10216943Abstract: Dynamic security questions. In an embodiment of the invention, a security question and one or more rules for generating an answer to the security question are received. The security question and the rules for generating and answer to the security question are associated with security credentials of a user. For authentication, a first answer to a security question associated with a user is received. One or more rules for generating an answer to the security question are retrieved. A second answer to the security question is generated, based on the retrieved rules. The first answer is compared with the second answer, and the user is authenticated, based on the first answer matching the second answer.Type: GrantFiled: December 17, 2015Date of Patent: February 26, 2019Assignee: International Business Machines CorporationInventors: Hariharan Krishna, Arun Ramakrishnan, Ashrith Shetty, Rohit Shetty
-
Patent number: 10171329Abstract: Embodiments of the present invention provide methods, computer program products, and systems for optimizing log analysis, such as in SaaS environments. Embodiments of the present invention can be used to determine an optimal log analysis location and ensure that the log file is processed at the optimal location based, at least in part, on the log file size and available network bandwidth.Type: GrantFiled: December 20, 2017Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Albee Jhoney, Hariharan Krishna, Rohit Shetty
-
Publication number: 20180115477Abstract: Embodiments of the present invention provide methods, computer program products, and systems for optimizing log analysis, such as in SaaS environments. Embodiments of the present invention can be used to determine an optimal log analysis location and ensure that the log file is processed at the optimal location based, at least in part, on the log file size and available network bandwidth.Type: ApplicationFiled: December 20, 2017Publication date: April 26, 2018Inventors: Albee Jhoney, Hariharan Krishna, Rohit Shetty
-
Publication number: 20180114271Abstract: A method, computer program product, and system performing a method that includes a processor(s) obtaining a digital document defining insurance parameters for utilization by a user of a portion of computing resources selected from a group of computing resources comprising the shared computing environment. The processor(s) generates, based on the digital document, parameters defining the portion of the computing resources and risk management rules reflecting guaranteed thresholds for utilization and performance of the portion of the computing resources defined in the digital document. The processor(s) configures a controller in the shared computing environment, based on the parameters and the risk management rules and obtains a notification of a failure in the portion of the computing resources in violation of the risk management rules and details of the failure to determine the extent and impact of the failure. The processor(s) automatically generates a claim package and transmits it to the administrator.Type: ApplicationFiled: October 26, 2016Publication date: April 26, 2018Inventors: Albee JHONEY, Hariharan KRISHNA, Anbazhagan MANI, Umasuthan RAMAKRISHNAN
-
Patent number: 9917758Abstract: Embodiments of the present invention provide methods, computer program products, and systems for optimizing log analysis, such as in SaaS environments. Embodiments of the present invention can be used to determine an optimal log analysis location and ensure that the log file is processed at the optimal location based, at least in part, on the log file size and available network bandwidth.Type: GrantFiled: March 25, 2015Date of Patent: March 13, 2018Assignee: International Business Machines CorporationInventors: Albee Jhoney, Hariharan Krishna, Rohit Shetty
-
Publication number: 20170315838Abstract: The present subject matter relates to migrating a virtual machine (VM) from a source server to a destination server. The migration involves computation of a suitability score for each particular server in the plurality of candidate servers. The suitability score for a server indicates the suitability of the server to host the VM. In an example implementation, the suitability score for a server is computed based on satisfaction of at least one criterion for operation of the VM by the server.Type: ApplicationFiled: January 6, 2017Publication date: November 2, 2017Inventors: Murali Nidugala, Kalapriya Kannan, Hariharan Krishna
-
Publication number: 20170177881Abstract: Dynamic security questions. In an embodiment of the invention, a security question and one or more rules for generating an answer to the security question are received. The security question and the rules for generating and answer to the security question are associated with security credentials of a user. For authentication, a first answer to a security question associated with a user is received. One or more rules for generating an answer to the security question are retrieved. A second answer to the security question is generated, based on the retrieved rules. The first answer is compared with the second answer, and the user is authenticated, based on the first answer matching the second answer.Type: ApplicationFiled: December 17, 2015Publication date: June 22, 2017Inventors: Hariharan Krishna, Arun Ramakrishnan, Ashrith Setty, Rohit Shetty