Patents by Inventor Preetdeep Kumar
Preetdeep Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200133823Abstract: According to at least one embodiment, a known defect record, which includes a unique identifier for the known defect and one or more log files associated with the known defect, is accessed. A log file of the known defect record is accessed, and an error message is identified. The error message indicates one or more classes involved in producing the error and one or more methods associated with each class. A pattern object is generated based on the error message and the classes and methods indicated in the error message, and a known defect graph is updated based on the pattern object. The known defect graph includes vertices representing pattern objects for error messages identified in known defects of the defect management system, and edges representing relationships between the pattern objects, with each vertex indicating one or more defect identifiers for known defect records associated with the pattern object.Type: ApplicationFiled: October 24, 2018Publication date: April 30, 2020Applicant: CA, Inc.Inventors: Preetdeep Kumar, Subhadip Ghosh
-
Patent number: 10521407Abstract: A computing device analyzes the transaction entries in a transaction log to identify related commands associated with performing a set of data operations. Commands are considered to be potentially related if the commands are executed within a predetermined timespan. Sets of potentially related commands are then grouped together into corresponding candidate patterns, and further analyzed in view of additional information to determine a probability that the potentially related commands of a candidate pattern are actually related. A confidence value indicating that probability is also determined. Application management tasks, such as database optimization and recovery tasks, for example, may then be performed based on the candidate patterns that meet or exceed a predetermined threshold.Type: GrantFiled: March 31, 2015Date of Patent: December 31, 2019Assignee: CA, Inc.Inventors: Philippe Dubost, Shweta Tiwari, Brian Hughes, Preetdeep Kumar
-
Patent number: 10474954Abstract: Systems and methods may include receiving, by an expert system, performance data for a monitored system. The systems and methods may include generating a prediction for the monitored system in response to determining that the performance data satisfies a condition. The prediction may identify an anomaly that is predicted to occur. The systems and methods may include receiving, by a filter system, the prediction, information identifying the condition, and user information. The user information may include user preference information and user feedback information. The systems and methods may include determining a filter criteria based on the user information. The filter criteria may be based on the preferences for predictions to be provided to the user and on the historical user feedback regarding the historical predictions. The systems and methods may include providing the prediction to the user in response to determining that the particular prediction satisfies the filter criteria.Type: GrantFiled: June 29, 2015Date of Patent: November 12, 2019Assignee: CA, Inc.Inventors: Preetdeep Kumar, Rashmi Gupta, Shweta Tiwari, Steven L. Greenspan, Serguei Mankovskii
-
Publication number: 20190014010Abstract: A normalized SDN interface (hereinafter “SDN interface”) can present a single, consistent SDN interface, adapting messages received at the SDN interface to the individual SDN protocols implemented by SDN managers and SDN devices. The SDN interface thus allows a service manager and other components to implement a single protocol, simplifying the network management functionality and operations. The SDN interface can include individual, “pluggable” adapters for each of the particular SDN protocols used by the virtualized network functionality available to the service manager.Type: ApplicationFiled: August 29, 2018Publication date: January 10, 2019Inventors: Michael Paul Shevenell, Preetdeep Kumar
-
Patent number: 10122610Abstract: A method includes performing, by a processor: receiving a selection of a network service, determining a plurality of Virtual Network Functions (VNFs) and a plurality of Virtual Machines (VMs) based on the selection of the network service, the plurality of VNFs being configured to run on the plurality of VMs, generating a plurality of tuples, each of the plurality of tuples corresponding to a combination of one of the plurality of VNFs and one of the plurality of VMs where the one of the plurality of VNFs is configured to run on the one of the plurality of VMs, receiving a plurality of VNF performance parameters, estimating values for each of the plurality of VNF performance parameters for each of the plurality of tuples, respectively, processing the values for each of the plurality of VNF performance parameters to generate a plurality of scores for the plurality of tuples, respectively, generating a plurality of VNF Forwarding Graphs (FGs), each of the VNF FGs corresponding to a combination of ones of the pluType: GrantFiled: March 25, 2016Date of Patent: November 6, 2018Assignee: CA, Inc.Inventors: Preetdeep Kumar, Ravindra Kumar Puli
-
Patent number: 10089334Abstract: A computing device analyzes the transaction entries in a transaction log to identify related commands associated with performing a set of data operations. Commands are considered to be potentially related if the commands are executed within a predetermined timespan. Sets of potentially related commands are then grouped together into corresponding candidate patterns, and further analyzed in view of additional information to determine a probability that the potentially related commands of a candidate pattern are actually related. A confidence value indicating that probability is also determined. Application management tasks, such as database optimization and recovery tasks, for example, may then be performed based on the candidate patterns that meet or exceed a predetermined threshold.Type: GrantFiled: March 26, 2015Date of Patent: October 2, 2018Assignee: CA, Inc.Inventors: Philippe Dubost, Shweta Tiwari, Brian Hughes, Preetdeep Kumar
-
Patent number: 10084657Abstract: A first message that conforms to a first software-defined networking protocol is received from a first source component. A first destination component associated with the first message is identified. A second software-defined networking protocol is determined based, at least in part, on the first destination component. The second software-defined networking protocol is one of a plurality of software-defined networking protocols. A second message that conforms to the second software-defined networking protocol is generated based, at least in part, on the first message. The second message is sent to the first destination component.Type: GrantFiled: June 29, 2015Date of Patent: September 25, 2018Assignee: CA, Inc.Inventors: Michael Paul Shevenell, Preetdeep Kumar
-
Publication number: 20180260421Abstract: A computing device identifies a table of a relational database from a relational database query that references the table. The computing device provisionally updates a full schema of a non-relational database with a partial schema that describes the table pending evaluation of the full schema. The computing device accepts or rejects the provisional updating of the full schema according to the partial schema responsive to the evaluation of the full schema.Type: ApplicationFiled: March 10, 2017Publication date: September 13, 2018Inventor: Preetdeep Kumar
-
Patent number: 10057112Abstract: An electronic device includes a processor and a memory coupled to the processor and storing computer readable program code that when executed by the processor causes the processor to perform operations including generating, at given time intervals, a plurality of topology graphs that correspond to a service chain that comprises a plurality of virtual network functions (VNFs) and that is operating in a software defined network (SDN)/network function virtualization (NFV) computing environment, each of the plurality of topology graphs corresponding to a different one of the time intervals. Operations may include comparing a first one of the plurality of topology graphs that is received at a first time to a second one of the plurality of topology graphs that is received at a second time that is after the first time to determine if the service chain has a fault.Type: GrantFiled: March 24, 2016Date of Patent: August 21, 2018Assignee: CA, INC.Inventors: Michael Paul Shevenell, Preetdeep Kumar, Ravindra Kumar Puli
-
Publication number: 20170279923Abstract: A method includes performing, by a processor: receiving a selection of a network service, determining a plurality of Virtual Network Functions (VNFs) and a plurality of Virtual Machines (VMs) based on the selection of the network service, the plurality of VNFs being configured to run on the plurality of VMs, generating a plurality of tuples, each of the plurality of tuples corresponding to a combination of one of the plurality of VNFs and one of the plurality of VMs where the one of the plurality of VNFs is configured to run on the one of the plurality of VMs, receiving a plurality of VNF performance parameters, estimating values for each of the plurality of VNF performance parameters for each of the plurality of tuples, respectively, processing the values for each of the plurality of VNF performance parameters to generate a plurality of scores for the plurality of tuples, respectively, generating a plurality of VNF Forwarding Graphs (FGs), each of the VNF FGs corresponding to a combination of ones of the pluType: ApplicationFiled: March 25, 2016Publication date: September 28, 2017Applicant: CA, Inc.Inventors: Preetdeep Kumar, Ravindra Kumar PULI
-
Publication number: 20170279668Abstract: An electronic device includes a processor and a memory coupled to the processor and storing computer readable program code that when executed by the processor causes the processor to perform operations including generating, at given time intervals, a plurality of topology graphs that correspond to a service chain that comprises a plurality of virtual network functions (VNFs) and that is operating in a software defined network (SDN)/network function virtualization (NFV) computing environment, each of the plurality of topology graphs corresponding to a different one of the time intervals. Operations may include comparing a first one of the plurality of topology graphs that is received at a first time to a second one of the plurality of topology graphs that is received at a second time that is after the first time to determine if the service chain has a fault.Type: ApplicationFiled: March 24, 2016Publication date: September 28, 2017Applicant: CA, Inc.Inventors: Michael Paul Shevenell, Preetdeep Kumar, Ravindra Kumar Puli
-
Publication number: 20160379119Abstract: Systems and methods may include receiving, by an expert system, performance data for a monitored system. The systems and methods may include generating a prediction for the monitored system in response to determining that the performance data satisfies a condition. The prediction may identify an anomaly that is predicted to occur. The systems and methods may include receiving, by a filter system, the prediction, information identifying the condition, and user information. The user information may include user preference information and user feedback information. The systems and methods may include determining a filter criteria based on the user information. The filter criteria may be based on the preferences for predictions to be provided to the user and on the historical user feedback regarding the historical predictions. The systems and methods may include providing the prediction to the user in response to determining that the particular prediction satisfies the filter criteria.Type: ApplicationFiled: June 29, 2015Publication date: December 29, 2016Applicant: CA, INC.Inventors: Preetdeep KUMAR, Rashmi GUPTA, Shweta TIWARI, Steven L. GREENSPAN, Serguei MANKOVSKII
-
Publication number: 20160380831Abstract: A first message that conforms to a first software-defined networking protocol is received from a first source component. A first destination component associated with the first message is identified. A second software-defined networking protocol is determined based, at least in part, on the first destination component. The second software-defined networking protocol is one of a plurality of software-defined networking protocols. A second message that conforms to the second software-defined networking protocol is generated based, at least in part, on the first message. The second message is sent to the first destination component.Type: ApplicationFiled: June 29, 2015Publication date: December 29, 2016Inventors: Michael Paul Shevenell, Preetdeep Kumar
-
Publication number: 20160292408Abstract: A method for continuously authenticating a user of voice recognition services is described. According to the method a user is initially authenticated, with a user interface for a computer system that accepts vocal input, by comparing vocal input to a pre-recorded file corresponding to an approved user. The input from a current user is compared to an approved user profile corresponding to the approved user. A risk factor is determined based on a deviation of current user input to the user interface from the approved user profile. The current user is selectively re-authenticated based on the risk factor.Type: ApplicationFiled: March 31, 2015Publication date: October 6, 2016Applicant: CA, INC.Inventors: LIXIN ZHANG, PREETDEEP KUMAR, RAMAPRAKASH GANESAN, PREETI ARORA, JUDITH KRUNTORAD, STEVEN GREENSPAN
-
Publication number: 20160283584Abstract: A computing device analyzes the transaction entries in a transaction log to identify related commands associated with performing a set of data operations. Commands are considered to be potentially related if the commands are executed within a predetermined timespan. Sets of potentially related commands are then grouped together into corresponding candidate patterns, and further analyzed in view of additional information to determine a probability that the potentially related commands of a candidate pattern are actually related. A confidence value indicating that probability is also determined. Application management tasks, such as database optimization and recovery tasks, for example, may then be performed based on the candidate patterns that meet or exceed a predetermined threshold.Type: ApplicationFiled: March 31, 2015Publication date: September 29, 2016Inventors: Philippe Dubost, Shweta Tiwari, Brian Hughes, Preetdeep Kumar
-
Publication number: 20160283529Abstract: A computing device analyzes the transaction entries in a transaction log to identify related commands associated with performing a set of data operations. Commands are considered to be potentially related if the commands are executed within a predetermined timespan. Sets of potentially related commands are then grouped together into corresponding candidate patterns, and further analyzed in view of additional information to determine a probability that the potentially related commands of a candidate pattern are actually related. A confidence value indicating that probability is also determined. Application management tasks, such as database optimization and recovery tasks, for example, may then be performed based on the candidate patterns that meet or exceed a predetermined threshold.Type: ApplicationFiled: March 26, 2015Publication date: September 29, 2016Inventors: Philippe Dubost, Shweta Tiwari, Brian Hughes, Preetdeep Kumar