Patents by Inventor Hariharan Krishna

Hariharan Krishna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220398288
    Abstract: In an approach to improve recommendation generating through IoT devices, embodiments abstract specific messaging formats from various IoT devices, map, the abstracted messaging formats to a canonical model associated to device types using based on collected IoT device data, and determine a context of data received from the plurality of IoT devices based on the type of IoT device and historical trend analysis of canonical data points from similar device types. Further, embodiments derive an association between data points among the plurality of IoT devices in a solution, determine one or more contexts of the established data point associations in the solution, and recommend one or more charts, events, and associated data based on a derived context and a visualization map. Additionally, embodiments output, by a user interface, the recommended chart events and associated data.
    Type: Application
    Filed: June 14, 2021
    Publication date: December 15, 2022
    Inventors: Dinesh G. Venkatraman, Hariharan N. Venkitachalam, Alankar Srivastava, D Krishna Vinci
  • Patent number: 11477293
    Abstract: A method for migrating an application includes representing the application as a vector including metadata about the application and at least one customer constraint, scoring a deviation of data consistency for the application related to each of a plurality of clouds, including a cloud in which the application is currently deployed and a plurality of potential target clouds, selecting one of the potential target clouds based on the scoring, wherein the selected cloud has an improved score over the cloud in which the application is current deployed, and migrating the application to the selected cloud.
    Type: Grant
    Filed: February 19, 2021
    Date of Patent: October 18, 2022
    Assignee: International Business Machines Corporation
    Inventors: Sudheesh S. Kairali, Abhinav Gupta, Abhishek Seth, Shajeer K Mohammed, Hariharan Krishna
  • Publication number: 20220292032
    Abstract: Disclosed embodiments provide features for the architecture of microservices. A global context cache is created for a microservice environment that is accessible from multiple deployed microservices. Data from various customers/applications can be aggregated to establish a determination of when a read or write access would fail due to permissions, and/or other condition such as existence or non-existence of certain data. In such situations, an error can be returned from the global context cache in much less time than if the access request propagated throughout the computer network to the persistent storage.
    Type: Application
    Filed: March 11, 2021
    Publication date: September 15, 2022
    Inventors: Hariharan Krishna, Shajeer K Mohammed, Sudheesh S. Kairali
  • Patent number: 11435874
    Abstract: The present disclosure describes methods and systems for a document server communicatively coupled to at least one client computing device, a document comprising an operation log, wherein the operation log comprises at least one first sequential operation defining operations to create data values of the document, a document object model, wherein the document is at least partially positioned on at least one of the document server and a first client computing device of the at least one client computing device, and a formula engine, wherein the formula engine is structured to determine a calculation definition in response to the user formula value and the document object model.
    Type: Grant
    Filed: November 20, 2020
    Date of Patent: September 6, 2022
    Assignee: Coda Project, Inc.
    Inventors: Melissa Ming-Sak Boucher, Jeremy Edward Britton, Luke Bayes, Monica F. Caso, Alexander W. Deneui, Christopher Leland Eck, Nigel Robin Ellis, Filipe P. Fortes, David Lilja Greenspan, Brett Robert Hobbs, Matthew B. Hudson, Timothy Andrew James, Kenneth Francis Mendes, Shishir S. Mehrotra, Trevor Michael O'Brien, Lane Patrick Shackleton, Rhed Shi, Hariharan Sivaramakrishnan, Jason Peter Stowe, Jason Andrew Tamulonis, Himanshu Vasishth, Ramesh Krishna Vyaghrapuri, David Richard Wright, Irvin Zhan, Roger Mathieu Zurawicki
  • Publication number: 20220272157
    Abstract: A method for migrating an application includes representing the application as a vector including metadata about the application and at least one customer constraint, scoring a deviation of data consistency for the application related to each of a plurality of clouds, including a cloud in which the application is currently deployed and a plurality of potential target clouds, selecting one of the potential target clouds based on the scoring, wherein the selected cloud has an improved score over the cloud in which the application is current deployed, and migrating the application to the selected cloud.
    Type: Application
    Filed: February 19, 2021
    Publication date: August 25, 2022
    Inventors: Sudheesh S. Kairali, Abhinav Gupta, Abhishek Seth, Shajeer K Mohammed, Hariharan Krishna
  • Patent number: 11188984
    Abstract: A method, computer program product, and system performing a method that includes a processor(s) obtaining a digital document defining insurance parameters for utilization by a user of a portion of computing resources selected from a group of computing resources comprising the shared computing environment. The processor(s) generates, based on the digital document, parameters defining the portion of the computing resources and risk management rules reflecting guaranteed thresholds for utilization and performance of the portion of the computing resources defined in the digital document. The processor(s) configures a controller in the shared computing environment, based on the parameters and the risk management rules and obtains a notification of a failure in the portion of the computing resources in violation of the risk management rules and details of the failure to determine the extent and impact of the failure. The processor(s) automatically generates a claim package and transmits it to the administrator.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: November 30, 2021
    Assignee: International Business Machines Corporation
    Inventors: Albee Jhoney, Hariharan Krishna, Anbazhagan Mani, Umasuthan Ramakrishnan
  • Patent number: 11169906
    Abstract: Embodiments of the present invention enable users to extract knowledge from testing scenarios performed during application development, and later employ that knowledge to interpret application usage scenarios to enhance serviceability of applications by expediting identification and solving of problems. In an exemplary embodiment, log data generated during simulation of test cases is analyzed to create one or more rules based on patterns in which one or more log entries appear in the log data. Later, log data may be analyzed to look for a pattern of log entries that matches a pattern-based rule, thereby facilitating faster identification and resolution of the problem.
    Type: Grant
    Filed: February 5, 2019
    Date of Patent: November 9, 2021
    Assignee: International Business Machines Corporation
    Inventors: Hariharan Krishna, Arun Ramakrishnan, Rohit Shetty
  • Patent number: 10652327
    Abstract: The present subject matter relates to migrating a virtual machine (VM) from a source server to a destination server. The migration involves computation of a suitability score for each particular server in the plurality of candidate servers. The suitability score for a server indicates the suitability of the server to host the VM. In an example implementation, the suitability score for a server is computed based on satisfaction of at least one criterion for operation of the VM by the server.
    Type: Grant
    Filed: January 6, 2017
    Date of Patent: May 12, 2020
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Murali Nidugala, Kalapriya Kannan, Hariharan Krishna
  • Publication number: 20190259105
    Abstract: A method, computer program product, and system performing a method that includes a processor(s) obtaining a digital document defining insurance parameters for utilization by a user of a portion of computing resources selected from a group of computing resources comprising the shared computing environment. The processor(s) generates, based on the digital document, parameters defining the portion of the computing resources and risk management rules reflecting guaranteed thresholds for utilization and performance of the portion of the computing resources defined in the digital document. The processor(s) configures a controller in the shared computing environment, based on the parameters and the risk management rules and obtains a notification of a failure in the portion of the computing resources in violation of the risk management rules and details of the failure to determine the extent and impact of the failure. The processor(s) automatically generates a claim package and transmits it to the administrator.
    Type: Application
    Filed: May 6, 2019
    Publication date: August 22, 2019
    Inventors: Albee Jhoney, Hariharan Krishna, Anbazhagan Mani, Umasuthan Ramakrishnan
  • Patent number: 10332212
    Abstract: A method, computer program product, and system performing a method that includes a processor(s) obtaining a digital document defining insurance parameters for utilization by a user of a portion of computing resources selected from a group of computing resources comprising the shared computing environment. The processor(s) generates, based on the digital document, parameters defining the portion of the computing resources and risk management rules reflecting guaranteed thresholds for utilization and performance of the portion of the computing resources defined in the digital document. The processor(s) configures a controller in the shared computing environment, based on the parameters and the risk management rules and obtains a notification of a failure in the portion of the computing resources in violation of the risk management rules and details of the failure to determine the extent and impact of the failure. The processor(s) automatically generates a claim package and transmits it to the administrator.
    Type: Grant
    Filed: October 26, 2016
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventors: Albee Jhoney, Hariharan Krishna, Anbazhagan Mani, Umasuthan Ramakrishnan
  • Publication number: 20190171549
    Abstract: Embodiments of the present invention enable users to extract knowledge from testing scenarios performed during application development, and later employ that knowledge to interpret application usage scenarios to enhance serviceability of applications by expediting identification and solving of problems. In an exemplary embodiment, log data generated during simulation of test cases is analyzed to create one or more rules based on patterns in which one or more log entries appear in the log data. Later, log data may be analyzed to look for a pattern of log entries that matches a pattern-based rule, thereby facilitating faster identification and resolution of the problem.
    Type: Application
    Filed: February 5, 2019
    Publication date: June 6, 2019
    Inventors: Hariharan Krishna, Arun Ramakrishnan, Rohit Shetty
  • Patent number: 10248541
    Abstract: Embodiments of the present invention enable users to extract knowledge from testing scenarios performed during application development, and later employ that knowledge to interpret application usage scenarios to enhance serviceability of applications by expediting identification and solving of problems. In an exemplary embodiment, log data generated during simulation of test cases is analyzed to create one or more rules based on patterns in which one or more log entries appear in the log data. Later, log data may be analyzed to look for a pattern of log entries that matches a pattern-based rule, thereby facilitating faster identification and resolution of the problem.
    Type: Grant
    Filed: January 25, 2017
    Date of Patent: April 2, 2019
    Assignee: International Business Machines Corporation
    Inventors: Hariharan Krishna, Arun Ramakrishnan, Rohit Shetty
  • Patent number: 10235275
    Abstract: Embodiments of the present invention enable users to extract knowledge from testing scenarios performed during application development, and later employ that knowledge to interpret application usage scenarios to enhance serviceability of applications by expediting identification and solving of problems. In an exemplary embodiment, log data generated during simulation of test cases is analyzed to create one or more rules based on patterns in which one or more log entries appear in the log data. Later, log data may be analyzed to look for a pattern of log entries that matches a pattern-based rule, thereby facilitating faster identification and resolution of the problem.
    Type: Grant
    Filed: January 25, 2017
    Date of Patent: March 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Hariharan Krishna, Arun Ramakrishnan, Rohit Shetty
  • Patent number: 10216943
    Abstract: Dynamic security questions. In an embodiment of the invention, a security question and one or more rules for generating an answer to the security question are received. The security question and the rules for generating and answer to the security question are associated with security credentials of a user. For authentication, a first answer to a security question associated with a user is received. One or more rules for generating an answer to the security question are retrieved. A second answer to the security question is generated, based on the retrieved rules. The first answer is compared with the second answer, and the user is authenticated, based on the first answer matching the second answer.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: February 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Hariharan Krishna, Arun Ramakrishnan, Ashrith Shetty, Rohit Shetty
  • Patent number: 10171329
    Abstract: Embodiments of the present invention provide methods, computer program products, and systems for optimizing log analysis, such as in SaaS environments. Embodiments of the present invention can be used to determine an optimal log analysis location and ensure that the log file is processed at the optimal location based, at least in part, on the log file size and available network bandwidth.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Albee Jhoney, Hariharan Krishna, Rohit Shetty
  • Publication number: 20180115477
    Abstract: Embodiments of the present invention provide methods, computer program products, and systems for optimizing log analysis, such as in SaaS environments. Embodiments of the present invention can be used to determine an optimal log analysis location and ensure that the log file is processed at the optimal location based, at least in part, on the log file size and available network bandwidth.
    Type: Application
    Filed: December 20, 2017
    Publication date: April 26, 2018
    Inventors: Albee Jhoney, Hariharan Krishna, Rohit Shetty
  • Publication number: 20180114271
    Abstract: A method, computer program product, and system performing a method that includes a processor(s) obtaining a digital document defining insurance parameters for utilization by a user of a portion of computing resources selected from a group of computing resources comprising the shared computing environment. The processor(s) generates, based on the digital document, parameters defining the portion of the computing resources and risk management rules reflecting guaranteed thresholds for utilization and performance of the portion of the computing resources defined in the digital document. The processor(s) configures a controller in the shared computing environment, based on the parameters and the risk management rules and obtains a notification of a failure in the portion of the computing resources in violation of the risk management rules and details of the failure to determine the extent and impact of the failure. The processor(s) automatically generates a claim package and transmits it to the administrator.
    Type: Application
    Filed: October 26, 2016
    Publication date: April 26, 2018
    Inventors: Albee JHONEY, Hariharan KRISHNA, Anbazhagan MANI, Umasuthan RAMAKRISHNAN
  • Patent number: 9917758
    Abstract: Embodiments of the present invention provide methods, computer program products, and systems for optimizing log analysis, such as in SaaS environments. Embodiments of the present invention can be used to determine an optimal log analysis location and ensure that the log file is processed at the optimal location based, at least in part, on the log file size and available network bandwidth.
    Type: Grant
    Filed: March 25, 2015
    Date of Patent: March 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Albee Jhoney, Hariharan Krishna, Rohit Shetty
  • Publication number: 20170315838
    Abstract: The present subject matter relates to migrating a virtual machine (VM) from a source server to a destination server. The migration involves computation of a suitability score for each particular server in the plurality of candidate servers. The suitability score for a server indicates the suitability of the server to host the VM. In an example implementation, the suitability score for a server is computed based on satisfaction of at least one criterion for operation of the VM by the server.
    Type: Application
    Filed: January 6, 2017
    Publication date: November 2, 2017
    Inventors: Murali Nidugala, Kalapriya Kannan, Hariharan Krishna
  • Publication number: 20170177881
    Abstract: Dynamic security questions. In an embodiment of the invention, a security question and one or more rules for generating an answer to the security question are received. The security question and the rules for generating and answer to the security question are associated with security credentials of a user. For authentication, a first answer to a security question associated with a user is received. One or more rules for generating an answer to the security question are retrieved. A second answer to the security question is generated, based on the retrieved rules. The first answer is compared with the second answer, and the user is authenticated, based on the first answer matching the second answer.
    Type: Application
    Filed: December 17, 2015
    Publication date: June 22, 2017
    Inventors: Hariharan Krishna, Arun Ramakrishnan, Ashrith Setty, Rohit Shetty