Patents by Inventor Jain Rohit

Jain Rohit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7877360
    Abstract: The embodiments of the invention provide a method of identifying a recovery point in a continuous data protection (CDP) log. More specifically, the method begins by detecting corrupted data in the CDP log and identifying the nature of corruption. Next, the nature of corruption is mapped to applications to identify components that may have caused the corrupted data. The method then finds a time instance of uncorrupted data in the components. Specifically, this can include searching CDP log entries in an order independent of log event age. Alternatively, the process of finding the time instance can include creating a data image of a first copy of uncorrupted data and sequentially apply entries of the CDP log until the corrupted data is reached.
    Type: Grant
    Filed: January 15, 2008
    Date of Patent: January 25, 2011
    Assignee: International Business Machines Corporation
    Inventors: Jain Rohit, Ramani R. Routray, Akshat Verma, Kaladhar Voruganti
  • Publication number: 20090182784
    Abstract: The embodiments of the invention provide a method of identifying a recovery point in a continuous data protection (CDP) log. More specifically, the method begins by detecting corrupted data in the CDP log and identifying the nature of corruption. Next, the nature of corruption is mapped to applications to identify components that may have caused the corrupted data. The method then finds a time instance of uncorrupted data in the components. Specifically, this can include searching CDP log entries in an order independent of log event age. Alternatively, the process of finding the time instance can include creating a data image of a first copy of uncorrupted data and sequentially apply entries of the CDP log until the corrupted data is reached.
    Type: Application
    Filed: January 15, 2008
    Publication date: July 16, 2009
    Applicant: International Business Machines Corporation
    Inventors: Jain Rohit, Ramani R. Routray, Akshat Verma, Kaladhar Voruganti
  • Publication number: 20070150599
    Abstract: Resource-usage profiles for application sessions of a number of client computing devices are generated, by aggregating profiles generated from application sessions running on the client computing devices. In particular, resource-usage information for application sessions is generated as the application sessions are generated within each client computing device of a number of client computing devices. Resource-usage profiles for application programs or application categories are then created based on this resource-usage information. Thus, at least one of the resource-usage profiles is based upon the resource-usage information generated by more than one of the client computing devices. Furthermore, a user may query the resource-usage profiles, so that the user is able to retrieve information regarding a desired application program as run on a number of the client computing devices. Additionally or alternatively, a computer program running on a client computing device may query the resource-usage profiles.
    Type: Application
    Filed: December 22, 2005
    Publication date: June 28, 2007
    Applicant: International Business Machines Corporation
    Inventors: Anindya Neogi, Ravi Kothari, Jain Rohit