Patents by Inventor Karthik Sivakumar

Karthik Sivakumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10298676
    Abstract: A method and associated systems for enabling digital asset reuse. Users are each associated with a collection of digital assets and each user and each asset is assigned an eminence value. When a first user initially accesses an asset, the asset is copied to the first user's collection, thus indicating the first user's favorable view of the asset. When a second user accesses the first user's copy, the asset is copied to the second user's collection, and the eminence of the first user and of the asset are increased. If a third user accesses the second user's copy, the asset is copied to the third user's collection and eminence values of the first and second users and of the asset increase. The second user may locate an asset in the first user's collection through means that include the second user's decision to “follow” the first user.
    Type: Grant
    Filed: January 20, 2017
    Date of Patent: May 21, 2019
    Assignee: International Business Machines Corporation
    Inventors: Anuradha Bhamidipaty, Saiprasad Kolluri Venkata Sesha, Gopal S. Pingali, Mark E. Podlaseck, Karthik Sivakumar
  • Publication number: 20170134484
    Abstract: A method and associated systems for enabling digital asset reuse. Users are each associated with a collection of digital assets and each user and each asset is assigned an eminence value. When a first user initially accesses an asset, the asset is copied to the first user's collection, thus indicating the first user's favorable view of the asset. When a second user accesses the first user's copy, the asset is copied to the second user's collection, and the eminence of the first user and of the asset are increased. If a third user accesses the second user's copy, the asset is copied to the third user's collection and eminence values of the first and second users and of the asset increase. The second user may locate an asset in the first user's collection through means that include the second user's decision to “follow” the first user.
    Type: Application
    Filed: January 20, 2017
    Publication date: May 11, 2017
    Inventors: Anuradha Bhamidipaty, Saiprasad Kolluri Venkata Sesha, Gopal S. Pingali, Mark E. Podlaseck, Karthik Sivakumar
  • Patent number: 9628551
    Abstract: A method and associated systems for reusing digital assets and automatically updating user and asset eminence values associated with each asset reuse. Users each control a collection of digital assets and each user and each asset is assigned an eminence value that represents a relative importance of a user or asset. When a first user accesses an asset, that asset is copied to the first user's collection. When a second user accesses the first user's copy, the asset is copied to the second user's collection, and the eminence of the first user and of the asset are increased. When a third user accesses the second user's copy, the asset is copied to the third user's collection and first-user's, second-user's, and asset's eminence values increase. The second user may automatically locate an asset in the first user's collection by “following” the first user.
    Type: Grant
    Filed: June 18, 2014
    Date of Patent: April 18, 2017
    Assignee: International Business Machines Corporation
    Inventors: Anuradha Bhamidipaty, Saiprasad Kolluri Venkata Sesha, Gopal S. Pingali, Mark E. Podlaseck, Karthik Sivakumar
  • Patent number: 9614875
    Abstract: A distributed cloud environment system comprising: a repository; a plurality of cloud managed nodes with a client program interface; a plurality of service management components with a service management component interface; a central trusted computing platform service in communication with the repository, the plurality of cloud managed nodes and the plurality of service management components, comprising: a first interface for communication with the client program interface in each of the plurality of cloud managed nodes through a first single touch point; and a second interface for communication with the service management component interface for the plurality of service management components through a second single touch point. The central trusted computing platform service manages interaction of the plurality of service management components with the plurality of cloud managed nodes, and the interaction of the plurality of cloud managed nodes with the repository.
    Type: Grant
    Filed: June 9, 2016
    Date of Patent: April 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Venkata R. Jagana, Srinivasa Rao Mangipudi, Neil I. Readshaw, Karthik Sivakumar
  • Patent number: 9552480
    Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: January 24, 2017
    Assignee: International Business Machines Corporation
    Inventors: Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
  • Patent number: 9542539
    Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
    Type: Grant
    Filed: June 20, 2016
    Date of Patent: January 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
  • Publication number: 20160306970
    Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
    Type: Application
    Filed: June 29, 2016
    Publication date: October 20, 2016
    Inventors: Jerome R. Bell, JR., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
  • Publication number: 20160294878
    Abstract: A distributed cloud environment system comprising: a repository; a plurality of cloud managed nodes with a client program interface; a plurality of service management components with a service management component interface; a central trusted computing platform service in communication with the repository, the plurality of cloud managed nodes and the plurality of service management components, comprising: a first interface for communication with the client program interface in each of the plurality of cloud managed nodes through a first single touch point; and a second interface for communication with the service management component interface for the plurality of service management components through a second single touch point. The central trusted computing platform service manages interaction of the plurality of service management components with the plurality of cloud managed nodes, and the interaction of the plurality of cloud managed nodes with the repository.
    Type: Application
    Filed: June 9, 2016
    Publication date: October 6, 2016
    Inventors: Venkata R. Jagana, Srinivasa Rao Mangipudi, Neil I. Readshaw, Karthik Sivakumar
  • Publication number: 20160292401
    Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
    Type: Application
    Filed: June 20, 2016
    Publication date: October 6, 2016
    Inventors: Jerome R. Bell, JR., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
  • Patent number: 9411954
    Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
    Type: Grant
    Filed: January 6, 2016
    Date of Patent: August 9, 2016
    Assignee: International Business Machines Corporation
    Inventors: Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
  • Patent number: 9401954
    Abstract: A distributed cloud environment system comprising: a repository; a plurality of cloud managed nodes with a client program interface; a plurality of service management components with a service management component interface; a central trusted computing platform service in communication with the repository, the plurality of cloud managed nodes and the plurality of service management components, comprising: a first interface for communication with the client program interface in each of the plurality of cloud managed nodes through a first single touch point; and a second interface for communication with the service management component interface for the plurality of service management components through a second single touch point. The central trusted computing platform service manages interaction of the plurality of service management components with the plurality of cloud managed nodes, and the interaction of the plurality of cloud managed nodes with the repository.
    Type: Grant
    Filed: November 6, 2013
    Date of Patent: July 26, 2016
    Assignee: International Business Machines Corporation
    Inventors: Venkata R. Jagana, Srinivasa R. Mangipudi, Neil I Readshaw, Karthik Sivakumar
  • Publication number: 20160132678
    Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
    Type: Application
    Filed: January 6, 2016
    Publication date: May 12, 2016
    Inventors: Jerome R. Bell, JR., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
  • Patent number: 9319430
    Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
    Type: Grant
    Filed: June 17, 2014
    Date of Patent: April 19, 2016
    Assignee: International Business Machines Corporation
    Inventors: Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
  • Publication number: 20150373064
    Abstract: A method and associated systems for enabling digital asset reuse. Users are each associated with a collection of digital assets and each user and each asset is assigned an eminence value. When a first user initially accesses an asset, the asset is copied to the first user's collection, thus indicating the first user's favorable view of the asset. When a second user accesses the first user's copy, the asset is copied to the second user's collection, and the eminence of the first user and of the asset are increased. If a third user accesses the second user's copy, the asset is copied to the third user's collection and eminence values of the first and second users and of the asset increase. The second user may locate an asset in the first user's collection through means that include the second user's decision to “follow” the first user.
    Type: Application
    Filed: June 18, 2014
    Publication date: December 24, 2015
    Inventors: Anuradha Bhamidipaty, Saiprasad Kolluri Venkata Sesha, Gopal S. Pingali, Mark E. Podlaseck, Karthik Sivakumar
  • Publication number: 20150365437
    Abstract: The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.
    Type: Application
    Filed: June 17, 2014
    Publication date: December 17, 2015
    Inventors: Jerome R. Bell, JR., Mari F. Heiser, Heather M. Hinton, Neil I. Readshaw, Karthik Sivakumar
  • Publication number: 20150127795
    Abstract: A distributed cloud environment system comprising: a repository; a plurality of cloud managed nodes with a client program interface; a plurality of service management components with a service management component interface; a central trusted computing platform service in communication with the repository, the plurality of cloud managed nodes and the plurality of service management components, comprising: a first interface for communication with the client program interface in each of the plurality of cloud managed nodes through a first single touch point; and a second interface for communication with the service management component interface for the plurality of service management components through a second single touch point. The central trusted computing platform service manages interaction of the plurality of service management components with the plurality of cloud managed nodes, and the interaction of the plurality of cloud managed nodes with the repository.
    Type: Application
    Filed: November 6, 2013
    Publication date: May 7, 2015
    Applicant: International Business Machines Corporation
    Inventors: Venkata R. Jagana, Srinivasa R. Mangipudi, Neil I. Readshaw, Karthik Sivakumar
  • Patent number: 6554714
    Abstract: The invention provides a tube assembly containing an extruded torque tube (12) and two yokes (14) welded to either end of the tube. The tube is made from a base material metal and boron carbide particles in a ratio of approximately between 2:1 to 10:1 by weight. In another embodiment, a driveshaft assembly includes the above tube assembly with a front universal joint (24) and slip yoke (26) attached to a front end, and a rear universal joint (22) attached to a rear end. An axle yoke (28) is coupled at the rear universal joint (22).
    Type: Grant
    Filed: June 8, 2001
    Date of Patent: April 29, 2003
    Assignee: American Axle & Manufacturing, Inc.
    Inventors: Donald Joseph Kurecka, Karthik Sivakumar
  • Publication number: 20030050127
    Abstract: A driveshaft assembly has a tubular element with yokes coupled at the ends of the tubular element. The yoke includes a stub shaft portion for inserting into and welding the yoke to the tubular element. A receiving portion is present in the yoke to receive a universal joint. A balancing portion is present on the yoke to balance the rotational imbalance of the driveshaft. The balancing portion includes a desired mass of material so that in order to rotationally balance the driveshaft, mass may be removed from the balancing portion of the yoke.
    Type: Application
    Filed: September 13, 2001
    Publication date: March 13, 2003
    Inventors: Mark S. Barrett, Karthik Sivakumar, Marc M. Menosky
  • Publication number: 20030013535
    Abstract: The invention provides a tube assembly containing an extruded torque tube (12) and two yokes (14) welded to either end of the tube. The tube is made from a base material metal and boron carbide particles in a ratio of approximately between 2:1 to 10:1 by weight. In another embodiment, a driveshaft assembly includes the above tube assembly with a front universal joint (24) and slip yoke (26) attached to a front end, and a rear universal joint (22) attached to a rear end. An axle yoke (28) is coupled at the rear universal joint (22).
    Type: Application
    Filed: June 8, 2001
    Publication date: January 16, 2003
    Inventors: Donald Joseph Kurecka, Karthik Sivakumar