Patents by Inventor Harish Bharti

Harish Bharti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250111009
    Abstract: A computer-implemented method assesses an impact of a change management strategy implementation. A first change management index score is identified. A graph theory is used to compute a degree centrality and a betweenness centrality of nodes, based on an adjacency matrix. A change management strategy framework is deployed based on the degree centrality, the betweenness centrality, and a closeness in a social media chain, to transition to one of the nodes having a probability above a predetermined probability threshold of influencing a change from one state to another. Personas are created that are associated with a particular technology, the identified first change management index score, the degree centrality, and the betweenness centrality of the nodes. A Markov chain model transition matrix measures a second change management index score after a time t is measured. A change management strategy framework is altered based on a parametric regression or a polynomial regression.
    Type: Application
    Filed: October 2, 2023
    Publication date: April 3, 2025
    Inventors: Pranshu Tiwari, Anuja Chakraborty, Harish Bharti, Saurabh Trehan, Rama Prasad Reddy Munagala, Swarnalata Patel
  • Patent number: 12249121
    Abstract: Identifying an indistinct entity within an image can include generating by an image filter multiple gradients, each of which corresponds to one of a plurality of pixels of an image captured by an imager. The image can be searched for a likely repeating pattern. Responsive to detecting, based on the multiple gradients, a likely repeating pattern within the image, data structures can be generated, the data structures comprising a set of probabilistically weighted feature vectors corresponding to the likely repeating pattern. A machine learning model can classify each of the set of probabilistically weighted feature vectors. An identity of the likely repeating pattern can be output, the identity based on the machine learning model classifications of the probabilistically weighted feature vectors.
    Type: Grant
    Filed: October 5, 2022
    Date of Patent: March 11, 2025
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rajesh Kumar Saxena, Harish Bharti, Pinaki Bhattacharya, Sandeep Sukhija, Dinesh Wadekar
  • Publication number: 20250068487
    Abstract: Optimal pod management is provided. A pod-warm component located on a host node is directed to trigger generation of a pod snapshot image of a pod in an optimal state running on the host node in response to determining that the pod has attained the optimal state. An input is received to instantiate a second instance of the pod on the host node in response to detecting that one or more of a plurality of pod performance metrics have exceeded a corresponding maximum pod performance metric threshold level. The pod-warm component located on the host node is directed to instantiate the second instance of the pod fully warm in the optimal state on the host node using the pod snapshot image of the pod to decrease startup time of the pod and increase performance of the host node.
    Type: Application
    Filed: August 24, 2023
    Publication date: February 27, 2025
    Inventors: Rajesh Kumar Saxena, Tanmay Arvind Ambre, Nampreet Pal Singh, Amit Deshpande, Harish Bharti
  • Publication number: 20250063022
    Abstract: One embodiment of the invention provides a method for reverse proxy inspection (RPI) of encrypted traffic in an edge-based network. The method comprises sharing a first certificate from an RPI instance to an edge-based network gateway. The first certificate is issued to the RPI instance. The method further comprises receiving, at the RPI instance, an encrypted message with an initial layer of encryption and a subsequent layer of encryption. The initial layer is encrypted using a second certificate issued to an edge-based network device. The subsequent layer is encrypted using the first certificate. The method further comprises, at the RPI instance, authenticating the first certificate, and decrypting the subsequent layer using the first certificate, resulting in the encrypted message with the initial layer intact. The method further comprises, at the RPI instance, inspecting the encrypted message, and forwarding the encrypted message to a centralized hub.
    Type: Application
    Filed: August 16, 2023
    Publication date: February 20, 2025
    Inventors: Sandeep Sukhija, Rajesh Kumar Saxena, Harish Bharti, Ankit Singhal
  • Patent number: 12229049
    Abstract: Managing data element caching is provided. Non-functional requirements of a system running an application are mapped to resource utilization and system performance metric values corresponding to each of a plurality of caching parameters for each of data elements corresponding to the application suitable for caching. A caching decision is generated for each of the data elements corresponding to the application suitable for caching by identifying certain ones of the data elements for the caching to improve at least one of performance and throughput of the system based on the mapping. A data element caching decision recommendation is generated for the application based on the caching decision. The data element caching decision recommendation corresponding to the application is output to a client device of a customer via a network.
    Type: Grant
    Filed: June 16, 2023
    Date of Patent: February 18, 2025
    Assignee: International Business Machines Corporation
    Inventors: Madhusmita Patil, Harish Bharti, Siddhartha Sood, Shweta Vohra
  • Publication number: 20250045175
    Abstract: Various embodiments are provided herein for intelligent, self-learning log configuration generation for a corresponding application in a computing environment. A plurality of input data sources are examined to generate a log profile. The log profile is used to generate one or more cognitive log configurations. Those of a plurality of attributes and fields which are determined useful to be logged before a runtime operation are automatically retrieved. The plurality of attributes and fields are continuously optimized during the runtime operation using a feedback mechanism.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Zhong Hui LIN, Harish BHARTI, Hong Bing ZHANG
  • Patent number: 12184496
    Abstract: Runtime binary migration is provided. A slice of a 5G network is provisioned based on time period and bandwidth requirements in accordance with a service level agreement corresponding to a customer requesting performance of a business function transaction. A runtime binary for invoking the slice of the 5G network is migrated to a nodal edge server for a set of edge devices associated with the nodal edge server to perform the business function transaction using the slice of the 5G network.
    Type: Grant
    Filed: August 11, 2022
    Date of Patent: December 31, 2024
    Assignee: International Business Machines Corporation
    Inventors: Rajesh Kumar Saxena, Harish Bharti, Sandeep Sukhija, Deepak Bajaj
  • Publication number: 20240428120
    Abstract: A method of using a computing device to provide non-functional requirement (NFR) fulfilment based technical disposition including identifying, by the computing device, optimal solutions based on overlaying prioritized NFRs for at least one target system as supported by each candidate system of multiple candidate systems. Supportable technical NFRs are used for each combination of options under the multiple candidate systems. Identifying further includes generating a cognitive processing model using machine learning adaptability for extracting NFRs for options for existing system designs. Classification overlay of each individual candidate system is provided across the NFRs prioritized based on business requirement. Unbiased decision processing utilized based on discord, exclusion and similarity as functions of the cognitive processing model. A sub-optimal solution space and adaptability for the sub-optimal solution space in absence of an optimal solution is identified.
    Type: Application
    Filed: June 26, 2023
    Publication date: December 26, 2024
    Inventors: Anil Paingankar, Rajesh Kumar Saxena, Harish Bharti, Sandeep Sukhija
  • Publication number: 20240419592
    Abstract: Managing data element caching is provided. Non-functional requirements of a system running an application are mapped to resource utilization and system performance metric values corresponding to each of a plurality of caching parameters for each of data elements corresponding to the application suitable for caching. A caching decision is generated for each of the data elements corresponding to the application suitable for caching by identifying certain ones of the data elements for the caching to improve at least one of performance and throughput of the system based on the mapping. A data element caching decision recommendation is generated for the application based on the caching decision. The data element caching decision recommendation corresponding to the application is output to a client device of a customer via a network.
    Type: Application
    Filed: June 16, 2023
    Publication date: December 19, 2024
    Inventors: Madhusmita Patil, Harish Bharti, Siddhartha Sood, Shweta Vohra
  • Patent number: 12154049
    Abstract: A method includes using, by one or more processors of a computer system, a cognitive model to estimate software development parameters for a software development project based on one or more similar past projects, and automatically assigning, by the one or more processors of the computer system, story points to sprints of the software development project based on the estimated software development parameters.
    Type: Grant
    Filed: October 27, 2021
    Date of Patent: November 26, 2024
    Assignee: International Business Machines Corporation
    Inventors: Pranshu Tiwari, Saurabh Trehan, Raghava Venkat, Balakrishnan Sreenivasan, Renny I John, Harish Bharti
  • Patent number: 12143453
    Abstract: Hybrid edge computing that includes a nimble framework that identifies services for available in a marketplace. The nimble framework defines a location for computing the services selected from the group consisting of a center server, an edge provision server and an edge node. The hybrid edge computing further includes a third party provider making are request for a service to the nimble framework. The hybrid edge computing further includes a virtualized service being provided by the nimble framework to the third party provider including a matched service to the third party provider request for the service, and an optimal location for computing.
    Type: Grant
    Filed: January 6, 2022
    Date of Patent: November 12, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Harish Bharti, Rajesh Kumar Saxena, Sandeep Sukhija, Deepak Bajaj
  • Publication number: 20240370287
    Abstract: Computer implemented methods, systems, and computer program products include program code executing on a processor(s) that ingests data from one or more computing environments, where the data is related to applications. The processor(s) identifies, based on utilizing topic modeling and latent semantic analysis of the data, homogenous applications among the applications, which include analyzing subdata handled by each application and functionalities of each application; the homogenous applications comprise similarities in the data and in the functionalities. The processor(s) determines overlapping data among the homogenous applications based on the topic modeling, the latent semantic analysis, and term frequency-inverse document frequency of terms in the overlapping data. The processor(s) selects, from the overlapping data, training data. The processor(s) utilizes the training data to calculate weights for disposition metrics and the metrics to predict the resource dispositions for the applications.
    Type: Application
    Filed: May 4, 2023
    Publication date: November 7, 2024
    Inventors: Pranshu Tiwari, Swarnalata Patel, Saurabh Trehan, Harish Bharti, Abhaya Kumar Sahoo
  • Patent number: 12131174
    Abstract: A system, method, and computer program product for determining “impact quantify measure-based” service chains cross interferences. The method includes quantifying the impact of one service chain on another service chain and to what extent so as facilitate making an informed decision whether to garner more resources and to fine tune the computational services for the service chain. There is further provided beforehand a certainty of required computational resources and the providing the impact or interferences details of one service chain on another helps in minimization of service quality degradation failures. The framework further runs a method step to apply a mutual convexity method on service chains to aid in forecasting cross interferences between chains and includes a step wherein, interferences between both dependent and independent service chain is calculated and provided.
    Type: Grant
    Filed: June 30, 2021
    Date of Patent: October 29, 2024
    Assignee: International Business Machines Corporation
    Inventors: Harish Bharti, Rajesh Kumar Saxena, Sandeep Sukhija, Deepak Bajaj
  • Patent number: 12132644
    Abstract: A computer-implemented method according to one embodiment includes establishing, for each hop in pathways of a network, a relation between a desired reliability and channel error. Based on the established relations, a maximum number of copies of packets to send from a source in the network to a target in the network is determined. An overhead associated with sending packets from the source to the target in the network is determined for each of the hops, and a first sum of such overheads is also determined. An overhead associated with sending an acknowledgement packet to the source is determined for each of the hops. A second sum is a sum of the overheads associated with sending the acknowledgement packet to the source. In response to a determination that a sum of the first sum and the second sum is less than a predetermined threshold value, the pathways are used.
    Type: Grant
    Filed: August 1, 2022
    Date of Patent: October 29, 2024
    Assignee: International Business Machines Corporation
    Inventors: Rajesh Kumar Saxena, Harish Bharti, Anupam Gupta, Sandeep Sukhija
  • Publication number: 20240330327
    Abstract: Leveraging production deployments to accelerate inflight deployments in a computing environment. A component is extracted, which is identified in the production deployment. The identified, extracted component is analyzed to derive a set of data describing the identified, extracted component. A relationship between the data is built. The relationship is used to develop an enterprise-wide methodology that is utilized to accelerate development of an additional, inflight deployment by comparing the additional, inflight deployment against the developed methodology.
    Type: Application
    Filed: March 30, 2023
    Publication date: October 3, 2024
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Siddhartha SOOD, Shweta VOHRA, Madhusmita PATIL, Harish BHARTI, Balakrishnan SREENIVASAN
  • Patent number: 12095659
    Abstract: A process for service chain instance pool sizing receives service requests for processing in a 5G network by a service function chain, of the 5G network, providing network function(s) to process the service requests. The method determines an average number of service requests to be processed, and determines a number of service chain instances to exist in a pool of service chain instances, of the service function chain, as a composite of (i) a number of instances to process service requests having arrived and making an initial relay through the service function chain and (ii) a number of instances to process service requests that were re-introduced after having previously arrived. The method additionally indicates the number of service chain instances to exist in the pool to a component responsible for controlling the number of service chain instances in the pool.
    Type: Grant
    Filed: August 22, 2023
    Date of Patent: September 17, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Harish Bharti, Rajesh Kumar Saxena, Sandeep Sukhija, Deepak Bajaj
  • Patent number: 12088627
    Abstract: A core set of nodes of a graph representing a network of devices is identified, a node of the graph representing a device in the network of devices, an edge of the graph representing an ability to transmit data between two devices represented by corresponding nodes of the graph. A device represented by a node more than one hop from any node in the core set of nodes of the graph is removed from the network of devices, the removing resulting in a validated network of devices. Using a number of devices in the validated network of devices, a number of security keys in use in the validated network is validated. A device in the validated network is caused to perform a task.
    Type: Grant
    Filed: September 8, 2021
    Date of Patent: September 10, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Harish Bharti, Rajesh Kumar Saxena, Anupam Gupta, Sandeep Sukhija
  • Patent number: 12072786
    Abstract: A method, computer program product, and system include a processor(s) that obtains a request for a transaction to be processed by an application in a computing system. The processor(s) applies, to the request for the transaction, an outlier detection model, to determine whether the transaction comprises attributes matching transaction tuples of one or more historical transactions identified as triggering issues in the computing system when the application processed the historical transactions. The processor(s) classifies the transaction as being an outlier transaction or as being a standard transaction, based on applying the outlier detection model. Based on determining that the transaction is an outlier transaction, concurrently with the application processing the transaction, the processor(s) turn on the debug trace to debug trace the application processing of the transaction.
    Type: Grant
    Filed: January 5, 2022
    Date of Patent: August 27, 2024
    Inventors: Harish Bharti, Ingo Averdunk, Shankar Sundaram Kalyana, Rajesh Kumar Saxena, Rajib Das
  • Patent number: 12067414
    Abstract: Inadvertent data swaps can be prevented by measuring volume of transactions in distributed computing environment to determine locations for potential data swaps; and managing a correlation between a thread identification (ID) and transaction header (ID) for transactions in the distributed computing environment. In some embodiments, the prevention of data swaps can further include performing a data transmission interruption to avoid data swaps at the locations for potential data swaps. When the thread identification (ID) and transaction header (ID) do not match the potential for data swaps can be high.
    Type: Grant
    Filed: November 4, 2021
    Date of Patent: August 20, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Abhay Kumar Patra, Rakesh Shinde, Harish Bharti, Vijay Ekambaram
  • Publication number: 20240241707
    Abstract: In various examples, a computer-implemented method includes: ingesting, by one or more computing devices, application deployment data for an application; generating, by the one or more computing devices, a cloud application deployment predictor data structure for the application; generating, by the one or more computing devices, objective functions for the cloud application deployment predictor data structure for the application; optimizing, by the one or more computing devices, between the objective functions for the application; and generating, by the one or more computing devices, based on the optimizing between the objective functions, a multi-cloud deployment map for the application.
    Type: Application
    Filed: January 12, 2023
    Publication date: July 18, 2024
    Inventors: PRANSHU TIWARI, Harish Bharti, Swarnalata Patel, NAVEEN NARAYANASWAMY, Abhaya Kumar Sahoo