Patents by Inventor Kiran Kumar Vaddi

Kiran Kumar Vaddi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11444785
    Abstract: Example techniques for establishing trusted communication with container-based services are described. In an example, a digital certificate stored in a memory is injected from the memory into a container. The container is external to the memory. The digital certificate is usable to establish a trusted communication between a service deployed in the container and a software program.
    Type: Grant
    Filed: March 5, 2019
    Date of Patent: September 13, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Kiran Kumar Vaddi, Om Kumar, Jaivish Kothari
  • Patent number: 11307839
    Abstract: Example techniques for updating of container-based applications are described. In an example, a second version of an application code or application code changes are retrieved from a code storage location. Based on the retrieved second version or the retrieved application code changes, an application hosted in a container is updated.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: April 19, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Kiran Kumar Vaddi, Om Kumar, Lokesh Shivashankara
  • Patent number: 10896067
    Abstract: A method for managing container usage in a computing system, includes: gathering a plurality of infrastructure costs associated with a container; invoking an orchestration tool in a containerization system to determine a plurality of workload costs associated with the container; determining a container usage cost from the gathered infrastructure costs and the determined workload costs; and managing the container usage in the computing system based on the determined container usage cost. In some instances, the method is implemented in the functionality of a cost analyzer resident on a computing apparatus. In other instances, the method may be implemented in a computing system in which a cost analyzer operates.
    Type: Grant
    Filed: January 11, 2019
    Date of Patent: January 19, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Kiran Kumar Vaddi, Hardik Dhirendra Parekh
  • Patent number: 10887312
    Abstract: Examples described relate to secure communication between services hosted on a private cloud and a public cloud. In an example, an agent on a private cloud may poll a secure server on a public cloud to determine whether the secure server includes a request for a service hosted on the private cloud. The request may be made by a service hosted on the public cloud. In response to a determination that the secure server includes the request for the service hosted on the private cloud the agent may retrieve the request from the secure server on the public cloud. The request may be executed on the private cloud, and a response may be generated. The agent may provide the response to the secure server on the public cloud. The response may be shared with the service hosted on the public cloud by the secure server.
    Type: Grant
    Filed: September 26, 2018
    Date of Patent: January 5, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Hardik Dhirendra Parekh, Om Kumar, Kiran Kumar Vaddi
  • Publication number: 20200409680
    Abstract: Example techniques for updating of container-based applications are described. In an example, a second version of an application code or application code changes are retrieved from a code storage location. Based on the retrieved second version or the retrieved application code changes, an application hosted in a container is updated.
    Type: Application
    Filed: June 26, 2019
    Publication date: December 31, 2020
    Inventors: Kiran Kumar Vaddi, Om Kumar, Lokesh Shivashankara
  • Publication number: 20200301759
    Abstract: Example techniques for chaining of brokered service instances are described. In an example, a chaining instruction to chain a first service instance and a second service instance may be received. The first service instance may be provisioned by a first service broker and the second service instance may be provisioned by a second service broker. In response to the chaining instruction, an output parameter of the first service instance is received. Further, an input parameter is supplied to the second service broker based on the output parameter. The supplying of the input parameter facilitates chaining between the first service instance and the second service instance.
    Type: Application
    Filed: March 18, 2019
    Publication date: September 24, 2020
    Inventors: Kiran Kumar Vaddi, Lokesh Shivashankara, Bharath Kumar
  • Patent number: 10778772
    Abstract: In some examples, a system receives information indicating resources relating to a workload, and receives information indicating relative priorities of a plurality of factors that affect placement of the workload on a cloud platform. For each respective cloud platform of a plurality of cloud platforms, the system computes factor values representing respective factors of the plurality of factors, the factor values computed for the respective cloud platform dependent upon information pertaining to the plurality of factors provided for the respective cloud platform, and computes an aggregate score based on the factor values for the respective cloud platform and weights assigned to the factor values based on the relative priorities. The system selects, for placement of the workload, a cloud platform from among the plurality of cloud platforms based on the aggregate scores.
    Type: Grant
    Filed: January 23, 2019
    Date of Patent: September 15, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventor: Kiran Kumar Vaddi
  • Publication number: 20200287724
    Abstract: Example techniques for establishing trusted communication with container-based services are described. In an example, a digital certificate stored in a memory is injected from the memory into a container. The container is external to the memory. The digital certificate is usable to establish a trusted communication between a service deployed in the container and a software program.
    Type: Application
    Filed: March 5, 2019
    Publication date: September 10, 2020
    Inventors: Kiran Kumar Vaddi, Om Kumar, Jaivish Kothari
  • Publication number: 20200252387
    Abstract: Example implementations relate to accessing a control platform. A computing device may comprise a processing resource and a memory resource storing non-transitory machine-readable instructions to cause the processing resource to receive an access request for a control platform of a plurality of control platforms, access the control platform based on the received access request, and transmit access description information based on an action performed with the control platform.
    Type: Application
    Filed: January 31, 2019
    Publication date: August 6, 2020
    Inventors: Jaivish Kothari, Kiran Kumar Vaddi
  • Publication number: 20200244721
    Abstract: Example implementations relate to deploying a workload. A computing device may comprise a processing resource and a memory resource storing non-transitory machine-readable instructions to cause the processing resource to receive a workload request, where the workload request includes a requested geographic location to deploy a workload, and deploy the workload on a worker node via a plugin in the requested geographic location, where the computing device is in a different geographic location than the worker node.
    Type: Application
    Filed: January 30, 2019
    Publication date: July 30, 2020
    Inventors: Lokesh S, Kiran Kumar Vaddi, Vikas D M
  • Publication number: 20200236169
    Abstract: In some examples, a system receives information indicating resources relating to a workload, and receives information indicating relative priorities of a plurality of factors that affect placement of the workload on a cloud platform. For each respective cloud platform of a plurality of cloud platforms, the system computes factor values representing respective factors of the plurality of factors, the factor values computed for the respective cloud platform dependent upon information pertaining to the plurality of factors provided for the respective cloud platform, and computes an aggregate score based on the factor values for the respective cloud platform and weights assigned to the factor values based on the relative priorities. The system selects, for placement of the workload, a cloud platform from among the plurality of cloud platforms based on the aggregate scores.
    Type: Application
    Filed: January 23, 2019
    Publication date: July 23, 2020
    Inventor: Kiran Kumar Vaddi
  • Publication number: 20200225990
    Abstract: A method for managing container usage in a computing system, includes: gathering a plurality of infrastructure costs associated with a container; invoking an orchestration tool in a containerization system to determine a plurality of workload costs associated with the container; determining a container usage cost from the gathered infrastructure costs and the determined workload costs; and managing the container usage in the computing system based on the determined container usage cost. In some instances, the method is implemented in the functionality of a cost analyzer resident on a computing apparatus. In other instances, the method may be implemented in a computing system in which a cost analyzer operates.
    Type: Application
    Filed: January 11, 2019
    Publication date: July 16, 2020
    Inventors: Kiran Kumar Vaddi, Hardik Dhirendra Parekh
  • Publication number: 20200099687
    Abstract: Examples described relate to secure communication between services hosted on a private cloud and a public cloud. In an example, an agent on a private cloud may poll a secure server on a public cloud to determine whether the secure server includes a request for a service hosted on the private cloud. The request may be made by a service hosted on the public cloud. In response to a determination that the secure server includes the request for the service hosted on the private cloud the agent may retrieve the request from the secure server on the public cloud. The request may be executed on the private cloud, and a response may be generated. The agent may provide the response to the secure server on the public cloud. The response may be shared with the service hosted on the public cloud by the secure server.
    Type: Application
    Filed: September 26, 2018
    Publication date: March 26, 2020
    Inventors: Hardik Dhirendra Parekh, Om Kumar, Kiran Kumar Vaddi