Patents by Inventor Pradipta Kumar Banerjee

Pradipta Kumar Banerjee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9594596
    Abstract: An input is received relative to a user objective. An application placement consideration is established based upon, at least in part, the user objective. A best-fit application placement is dynamically determined for a plurality of applications relative to a plurality of servers based upon, at least in part, the application placement consideration.
    Type: Grant
    Filed: March 29, 2012
    Date of Patent: March 14, 2017
    Assignee: International Business Machines Corporation
    Inventors: Pradipta Kumar Banerjee, Swarnalatha Mylavarapu, Vijay K. Sukthankar
  • Patent number: 9471389
    Abstract: An input is received relative to a user objective. An application placement consideration is established based upon, at least in part, the user objective. A best-fit application placement is dynamically determined for a plurality of applications relative to a plurality of servers based upon, at least in part, the application placement consideration.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: October 18, 2016
    Assignee: International Business Machines Corporation
    Inventors: Pradipta Kumar Banerjee, Swarnalatha Mylavarapu, Vijay K. Sukthankar
  • Patent number: 8495624
    Abstract: A method for provisioning a suitable operating system environment to a client machine in a client-server architecture including the at least one client machine in communication with a plurality of servers over a network. A pre-execution boot program is executed on powering the client machine, the pre-execution boot program being configured to identify a Dynamic Host Control Protocol (DHCP) server to obtain an Internet Protocol (IP) address for the client machine. Next, the client machine establishes contact with an installation server, which is coupled to the client machine over a network. Thereafter, the client machine receives a first software module from the installation server based on processor type of the client machine. The first software module scans the client machine using to obtain a list of hardware elements on the client machine and the client machine transmits the list of hardware elements on the client machine to the installation server.
    Type: Grant
    Filed: October 23, 2008
    Date of Patent: July 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Pradipta Kumar Banerjee, Vikas Bhardwaj
  • Patent number: 8434088
    Abstract: A computer implemented method, system and/or program product determine capacity planning of resources allocation for an application scheduled to execute on a virtual machine from a set of multiple applications by computing a mean associated with a pool of pre-defined resources utilization over a time interval; computing a variance associated with the pool of pre-defined resources utilization over the same time interval; identifying a set of resource to execute the scheduled application from the pool of pre-defined resources, wherein the pool of pre-defined resources is created from a pre-defined Service Level Agreement (SLA); and allocating a set of fixed resources from the pool of pre-defined resources to execute the application based on the mean resource utilization.
    Type: Grant
    Filed: February 18, 2010
    Date of Patent: April 30, 2013
    Assignee: International Business Machines Corporation
    Inventors: Pradipta Kumar Banerjee, Swarna Latha Mylavarapu, Vijay K Sukthankar
  • Publication number: 20130007279
    Abstract: An input is received relative to a user objective. An application placement consideration is established based upon, at least in part, the user objective. A best-fit application placement is dynamically determined for a plurality of applications relative to a plurality of servers based upon, at least in part, the application placement consideration.
    Type: Application
    Filed: June 30, 2011
    Publication date: January 3, 2013
    Applicant: International Business Machines Corporation
    Inventors: Pradipta Kumar Banerjee, Swarnalatha Mylavarapu, Vijay K. Sukthankar
  • Publication number: 20130007281
    Abstract: An input is received relative to a user objective. An application placement consideration is established based upon, at least in part, the user objective. A best-fit application placement is dynamically determined for a plurality of applications relative to a plurality of servers based upon, at least in part, the application placement consideration.
    Type: Application
    Filed: March 29, 2012
    Publication date: January 3, 2013
    Applicant: International Business Machines Corporation
    Inventors: Pradipta Kumar Banerjee, Swarnalatha Mylavarapu, Vijay K. Sukthankar
  • Publication number: 20110202925
    Abstract: A computer implemented method, system and/or program product determine capacity planning of resources allocation for an application scheduled to execute on a virtual machine from a set of multiple applications by computing a mean associated with a pool of pre-defined resources utilization over a time interval; computing a variance associated with the pool of pre-defined resources utilization over the same time interval; identifying a set of resource to execute the scheduled application from the pool of pre-defined resources, wherein the pool of pre-defined resources is created from a pre-defined Service Level Agreement (SLA); and allocating a set of fixed resources from the pool of pre-defined resources to execute the application based on the mean resource utilization.
    Type: Application
    Filed: February 18, 2010
    Publication date: August 18, 2011
    Applicant: International Business Machines Corporation
    Inventors: Pradipta Kumar Banerjee, Swarna Latha Mylavarapu, Vijay K. Sukthankar
  • Publication number: 20110119369
    Abstract: Disclosed are embodiments related to a method for monitoring performance of a plurality of client nodes. The client nodes are coupled to a master node over a network. The method comprises the master node requesting performance data from at least one of the client nodes. At least one of the client nodes being configured to collect the performance data from at least one other client node and transmit the performance data to the master node. Other embodiments are also disclosed.
    Type: Application
    Filed: November 13, 2009
    Publication date: May 19, 2011
    Applicant: International Business Machines,Corporation
    Inventor: PRADIPTA KUMAR BANERJEE
  • Patent number: 7797436
    Abstract: Methods, systems, and computer-readable mediums containing programmed instructions are disclosed for detecting an intrusion in a communications network. Data packets processed by a transport layer of a network protocol associated with the communications network are scanned using signatures from a repository of the signatures. A determination is made if the scanned data packets are malicious. One or more actions are taken if any data packets are determined to be malicious. Methods, systems, and computer-readable mediums containing programmed instructions are also disclosed for preventing an intrusion in a communications network.
    Type: Grant
    Filed: October 21, 2007
    Date of Patent: September 14, 2010
    Assignee: International Business Machines Corporation
    Inventors: Pradipta Kumar Banerjee, Ananth Narayan Mavinakayanahalli Gururaja
  • Patent number: 7725936
    Abstract: Methods, systems, and computer-readable mediums containing programmed instructions are disclosed for detecting an intrusion in a communications network. Data packets processed by a transport layer of a network protocol associated with the communications network are scanned using signatures from a repository of the signatures. A determination is made if the scanned data packets are malicious. One or more actions are taken if any data packets are determined to be malicious. Methods, systems, and computer-readable mediums containing programmed instructions are also disclosed for preventing an intrusion in a communications network.
    Type: Grant
    Filed: October 31, 2003
    Date of Patent: May 25, 2010
    Assignee: International Business Machines Corporation
    Inventors: Pradipta Kumar Banerjee, Ananth Narayan Mavinakayanahalli Gururaja
  • Publication number: 20100107155
    Abstract: A method for provisioning a suitable operating system environment to a client machine in a client-server architecture including the at least one client machine in communication with a plurality of servers over a network. A pre-execution boot program is executed on powering the client machine, the pre-execution boot program being configured to identify a Dynamic Host Control Protocol (DHCP) server to obtain an Internet Protocol (IP) address for the client machine. Next, the client machine establishes contact with an installation server, which is coupled to the client machine over a network. Thereafter, the client machine receives a first software module from the installation server based on processor type of the client machine. The first software module scans the client machine using to obtain a list of hardware elements on the client machine and the client machine transmits the list of hardware elements on the client machine to the installation server.
    Type: Application
    Filed: October 23, 2008
    Publication date: April 29, 2010
    Applicant: International Business Machines Corporation
    Inventors: Pradipta Kumar Banerjee, Vikas Bhardwaj
  • Publication number: 20080313309
    Abstract: Disclosed are a method, a client/server system and a computer program for controlling the data transfer from a server system to a client system that runs remotely an application on the server. The data transfer control is effected by defining a first trigger event and a second trigger event in the client system. The client system and the server are arranged so that an occurrence of a first trigger event terminates the transfer of at least one type of data from the server system to the client computer, while an occurrence of the second trigger event reintroduces the terminated data transfer.
    Type: Application
    Filed: June 18, 2007
    Publication date: December 18, 2008
    Inventor: Pradipta Kumar Banerjee