Patents by Inventor Naga Ayachitula
Naga Ayachitula has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8626888Abstract: A method, system, and article for autonomizing autonomic management of a data center, with the data center having at least one computer system and an associated component. Data is collected from the data center and used as input to identify a data center policy. A set of capabilities of elements of the data center are detected and cataloged based upon the collected data. At least one policy is dynamically selected from at least one set of master policies in a policy directory with the selected policy to support the cataloged capabilities of the data center, and to dynamically control selective application and to adapt parameters for quality of service. The selected policy is applied to manage the data center.Type: GrantFiled: October 27, 2009Date of Patent: January 7, 2014Assignee: International Business Machines CorporationInventors: Naga A. Ayachitula, Vijaya Jas, Kenneth David Christiance, Peter M. Jensen, Josephine E. Justin, Robert Larsen, Ann M. Moyer, Lisa Nayak, Rajeev Puri, Cheranellore Vasudevan, Chetna Dnyandeo Warade
-
Publication number: 20130340074Abstract: A computer hardware-implemented method, system, and/or computer program product manages software patches. A computer monitoring hardware system receives a notification of a new release of a software patch. The computer monitoring hardware system scores a security posture of a monitored computer system to generate a security posture value based on a set of computer system parameters for the monitored computer system. In response to patch control logic within the computer monitoring hardware system determining that the monitored computer system is authorized to install the software patch and that the security posture value exceeds the predetermined value, the computer monitoring hardware system retrieves and installs the software patch in the monitored computer system.Type: ApplicationFiled: June 13, 2012Publication date: December 19, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Naga A. AYACHITULA, William A. LEMKE, Rajeev PURI
-
Publication number: 20130205007Abstract: Embodiments of the present invention relate to an approach for suggesting/recommending migration of an IT environment to a cloud computing infrastructure. Specifically, in a typical embodiment, historical incident data of an information technology (IT) environment is analyzed. Based on the historical incident data, it may be determined whether a problem is recurring in the IT environment. If so, it may then be determined whether the problem can be mitigated in the cloud computing infrastructure. For example, it may be determined whether the cost of mitigating the problem by migrating to the cloud computing infrastructure is less than the cost of loss due to the problem within the current IT environment. A report particular to the IT environment that identifies a benefit of migrating the IT environment to the cloud computing infrastructure may be generated.Type: ApplicationFiled: February 8, 2012Publication date: August 8, 2013Applicant: International Business Machines CorporationInventors: Naga A. Ayachitula, Winnie Wing-Yee Cheng, James R. Moulic, Rajeev Puri, Sambit Sahu
-
Patent number: 8489547Abstract: A system, method and apparatus for performing information transformations on an information stream composed of configuration items (CIs) for improving data quality and extending the capabilities of a configuration management database (CMDB). In one embodiment the data transformations ensure that a CMDB can be used to manage environments that use Network Address Translation by the modification of the signatures of analyzed CIs so that the resulting set of CIs is unique. The modification is applied to augment the signature with a domain specific prefix so that, when loaded into the enterprise wide CMDB, a CI is uniquely identified.Type: GrantFiled: July 30, 2009Date of Patent: July 16, 2013Assignee: International Business Machines CorporationInventors: Naga A. Ayachitula, Melissa J. Buco, Krishna S. Garimella, Lalitha P. Kamesam, David Loewenstern, Larisa Shwartz, Maheswaran Surenda, Christopher Ward
-
Publication number: 20120331455Abstract: In a method for making a recommendation for installing a software patch on a target computer, a computer identifies a first and a second set of computers from a group of computers. Each computer in the first set has hardware and software components, which are identical to each other or differ from each other by less than a predetermined measure. Each computer in the second set has hardware and software components, which are identical to each other or differ from each other by less than a predetermined measure. The computer selects one of the first and the second sets of computers such that the selected set of computers includes a higher number of computers with the software patch already installed.Type: ApplicationFiled: June 24, 2011Publication date: December 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Naga A. Ayachitula, Ying Chen, Rajeev Puri, Cashchakanithara Venugopal, Li Jun Xia, Bo Yang, Sai Zeng
-
Publication number: 20110196957Abstract: Multiple policy engines may be integrated with a change and configuration change database to enable coordination of multiple policies by an embodiment comprising: a data center having a plurality of configuration items and connected to a network; a database connected to the network; a plurality of policy engines connected to the network; wherein each of the plurality of policy engines is configured to apply one or more policies to the data center in accordance with an awareness of all configuration item changes made by all other policy engines connected to the network; wherein the awareness comprises a plurality of relationships, each relationship being between a policy data and a configuration item.Type: ApplicationFiled: February 5, 2010Publication date: August 11, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Naga A. Ayachitula, Vijaya Jas, Kenneth D. Christiance, Peter M. Jensen, Josephine E. Justin, Robert Larsen, Ann M. Moyer, Lisa Nayak, Rajeev Puri, Cheranellore Vasudevan, Chetna D. Warade
-
Patent number: 7987146Abstract: A system and method for provisioning software on a plurality of computational nodes in a distributed computing environment. A plurality of support processing requirements associated with a software product is accepted. The plurality of requirements is expanded into multiple sets of installation requirements. At least one set of installation requirements in the multiple sets of installation requirements are minimized to produce at least one minimized set of installation requirements. A determination is made as to whether any pair of requirements in the minimized set of installation requirements includes a pair of conflicting requirements. A determination of whether the software product allows each requirement in the pair of conflicting requirements to be located on separate nodes is also made. At least one multi-node installation topology is determined for the software product.Type: GrantFiled: January 31, 2007Date of Patent: July 26, 2011Assignee: International Business Machines CorporationInventors: Larisa Shwartz, Genady Grabarnik, Maheswaran Surendra, Naga A. Ayachitula
-
Publication number: 20110099258Abstract: A method, system, and article for autonomizing autonomic management of a data center, with the data center having at least one computer system and an associated component. Data is collected from the data center and used as input to identify a data center policy. A set of capabilities of elements of the data center are detected and cataloged based upon the collected data. At least one policy is dynamically selected from at least one set of master policies in a policy directory with the selected policy to support the cataloged capabilities of the data center, and to dynamically control selective application and to adapt parameters for quality of service. The selected policy is applied to manage the data center.Type: ApplicationFiled: October 27, 2009Publication date: April 28, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Naga A. Ayachitula, Vijaya Jas, Kenneth David Christiance, Peter M. Jensen, Josephine E. Justin, Robert Larsen, Ann M. Moyer, Lisa Nayak, Rajeev Puri, Cheranellore Vasudevan, Chetna Dnyandeo Warade
-
Patent number: 7925679Abstract: Disclosed is a technique for result set management. One or more result sets are stored. Each result set was generated by executing a query. When at least one of a number of result sets that may be stored and a number of bucket tables that may hold result sets is modified, it is determined whether any of the one or more result sets are to be removed. When it is determined that one or more of the result sets are to be removed, those result sets are removed.Type: GrantFiled: September 5, 2008Date of Patent: April 12, 2011Assignee: International Business Machines CorporationInventors: Michael Stephen Schwartz, Naga A. Ayachitula, Shu-Ping Chang, Lenisha V. Gandhi
-
Publication number: 20110066442Abstract: A method for performing utility consumption disaggregation includes measuring a total utility consumption of a consumer during a specified time period, generating a first disaggregated utility consumption segment and a second disaggregated utility consumption segment, based on the total utility consumption of the consumer, and providing the consumer with disaggregated utility consumption statistics based on at least one of the first and second disaggregated utility consumption segments.Type: ApplicationFiled: September 13, 2010Publication date: March 17, 2011Applicant: International Business Machines CorporarionInventors: Naga A. Ayachitula, Tian-Jy Chao, Jing D. Dai, Milind R. Naphade, Sambit Sahu
-
Publication number: 20110029767Abstract: A system, method and apparatus for performing information transformations on an information stream composed of configuration items (CIs) for improving data quality and extending the capabilities of a configuration management database (CMDB). In one embodiment the data transformations ensure that a CMDB can be used to manage environments that use Network Address Translation by the modification of the signatures of analyzed CIs so that the resulting set of CIs is unique. The modification is applied to augment the signature with a domain specific prefix so that, when loaded into the enterprise wide CMDB, a CI is uniquely identified.Type: ApplicationFiled: July 30, 2009Publication date: February 3, 2011Applicant: International Business Machines CorporationInventors: Naga A. Ayachitula, Melissa J. Buco, Krishna S. Garimella, Lalitha P. Kamesam, David Loewenstern, Larisa Shwartz, Maheswaran Surenda, Christopher Ward
-
Publication number: 20110016368Abstract: A method for auditing and verifying configuration items (CIs) in an information technology (IT) configuration management database (CMDB) includes identifying which configuration item (CI) types should be part of an audit, defining link rules to link an authorized CI type stored in a CMDB to an actual CI type that is part of an IT infrastructure, retrieving all authorized CI instances of the identified CI types from the CMDB, retrieving all actual CI instances of the identified CI types from a discovery upload of a current IT environment, comparing the actual CI instances to the authorized CI instances, and taking remedial action when variances are discovered.Type: ApplicationFiled: July 14, 2009Publication date: January 20, 2011Applicant: International Business Machines CorporationInventors: Naga A. Ayachitula, Melissa J. Buco, Bradford Austin Fisher, David Loewenstern, Larisa Shwartz, Christopher Ward
-
Patent number: 7822785Abstract: Methods and apparatus of managing a CMDB are provided. At least one composite CI is utilized in the CMDB. The at least one composite CI is represented as a graph of navigable relationships between one or more supporting elements in accordance with a template. The one or more supporting elements comprise at least a root element of the composite CI.Type: GrantFiled: June 30, 2006Date of Patent: October 26, 2010Assignee: International Business Machines CorporationInventors: Naga A. Ayachitula, Krishna S. Garimella, Yan Or, Larisa Shwartz, Maheswaran Surendra
-
Patent number: 7647037Abstract: A method, system and computer program and method for delivering a streaming data to a remote device from a wireless transmitter. In one embodiment, a transmitter is configured to send units of the streaming data to the remote device. A receiver is configured to receive usage data about the streaming data from the remote device. An adjusting module is configured to automatically adjust a transmission strategy of unsent units of the streaming data based, at least in part, on the usage data as a function of time according to a transmission policy. The usage data may include at least location information about the remote device or time of day information at the remote device. A user interface at the remote device may be configured to adjust the predefined transmission policy.Type: GrantFiled: January 31, 2006Date of Patent: January 12, 2010Assignee: International Business Machines CorporationInventors: Naga A. Ayachitula, Andrew J. Bradfield, Shu-Ping Chang, James S. Lipscomb
-
Publication number: 20090327001Abstract: A method for facilitating compliance testing in an information technology (IT) environment is provided. The method includes defining each IT component of an enterprise as a set of attribute value pairs represented as a configuration item (CI) and defining relationships among the CIs. Configuration Standards for the CIs are defined to include scope identifying CIs to which the Configuration Standards apply and restrictions defining requirements for compliance. Compliance testing is performed for IT components of the enterprise against a selected Configuration Standards by determining, depending on the scope and the restrictions of each of the selected Configuration Standards, which of the IT components within the scope of the selected Configuration Standards fails to meet the restrictions of respective ones of the selected Configuration Standards; and by outputting results as a list, which includes each of the IT components that failed to meet respective ones of the selected Configuration Standards.Type: ApplicationFiled: June 30, 2008Publication date: December 31, 2009Applicant: International Business Machines CorporationInventors: Naga A. Ayachitula, Melissa J. Buco, Lalitha Kamesam, David Loewenstern, Larisa Shwartz, Christopher Ward
-
Patent number: 7623675Abstract: An improved solution for managing video data is provided. In particular, for each instance of a tracking object in video, an encapsulation asset is generated. The encapsulation asset includes a set of tracking object metadata, a set of background images from the video, a set of object images for the tracking object, and a set of reconstruction data that can be used to approximate the video using the sets of background images and object images. The encapsulation assets and/or video can be stored in a computer architecture, such as an enterprise information system, and searches can be performed on the encapsulation assets.Type: GrantFiled: September 19, 2005Date of Patent: November 24, 2009Assignee: International Business Machines CorporationInventors: Naga A. Ayachitula, Shu-Ping Chang, Arun Hampapur
-
Patent number: 7616113Abstract: An embodiment of the invention is a method of accurately determining the spatial location of an RFID tag in two-dimensions or three-dimensions. The method utilizes a plurality of RFID readers to make a plurality of distance, direction, and or time-of-flight determinations. Such determinations are made by sending a request signal from one of the plurality of RFID readers and listening for a response signal from an RFID tag received at each of the plurality of RFID readers. Correction factors are then determined and the time-of-flight factors adjusted. The adjusted time-of-flight factors are then used to determine more accurately the distances between the RFID tag and each of the plurality of RFID readers. These more accurate distance measurements are then used to determine the spatial location of the RFID tag.Type: GrantFiled: January 4, 2007Date of Patent: November 10, 2009Assignee: International Business Machines CorporationInventors: Naga A. Ayachitula, Stephen Brady, Shu-Ping Chang, James S. Lipscomb, Frank L. Stein
-
Patent number: 7543058Abstract: A method for facilitating compliance testing in an environment is provided. The method includes defining each component as a set of attribute value pairs represented as a configuration item (CI) and defining relationships among the CIs. Configuration Standards for the CIs are defined to include scope identifying CIs to which the Configuration Standards apply and restrictions defining requirements for compliance. Compliance testing is performed for components against a selected Configuration Standards by determining, depending on the scope and the restrictions of each of the selected Configuration Standards, which of the components within the scope of the selected Configuration Standards fails to meet the restrictions of respective ones of the selected Configuration Standards; and by outputting results as a list, which includes each of the components that failed to meet respective ones of the selected Configuration Standards.Type: GrantFiled: June 30, 2008Date of Patent: June 2, 2009Assignee: International Business Machines CorporationInventors: Naga A. Ayachitula, Melissa J. Buco, Lalitha Kamesam, David Loewenstern, Larisa Shwartz, Christopher Ward
-
Patent number: 7509627Abstract: A method for configuring multiple lifecycles, and associating each lifecycle with one or more subcategories of items includes receiving a request for a state change for an item in a current state; determining if the item's current state exists in the located lifecycle; wherein if the current state does not exist in the located lifecycle, the current state is updated with a series of update rules; determining if the current state has flags; wherein the flags are checked for one or more protection rules; generating a list of target states; receiving a user selected target state from the generated list; checking the selected target state for one or more associated protection rules; recording a state change for the selected target state in response to the satisfaction of the one or more associated protection rules, and if no protection rules are found; and propagating the state change.Type: GrantFiled: February 19, 2008Date of Patent: March 24, 2009Assignee: International Business Machines CorporationInventors: Naga A. Ayachitula, Melissa J. Buco, Lalitha P. Kamesam, David M. Loewenstern, Larisa Shwartz, Christopher Ward
-
Publication number: 20090006491Abstract: Disclosed is a technique for result set management. One or more result sets are stored. Each result set was generated by executing a query. When at least one of a number of result sets that may be stored and a number of bucket tables that may hold result sets is modified, it is determined whether any of the one or more result sets are to be removed. When it is determined that one or more of the result sets are to be removed, those result sets are removed.Type: ApplicationFiled: September 5, 2008Publication date: January 1, 2009Applicant: International Business Machines CorporationInventors: Michael Stephen Schwartz, Naga A. Ayachitula, Shu-Ping Chang, Lenisha V. Gandhi