Patents by Inventor R. Kumar
R. Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140012906Abstract: Techniques are provided for a peer-to-peer web traffic management. A first mapping between identifiers and peers in a network is established. Upon receiving a first request associated with a first identifier and classifiers, based, at least in part, on the first identifier, a first peer retrieves a first global counter snapshot and a first local increment counter, and uses them to determine whether the first peer can service the first request. If the determination is positive, then the first peer services the first request, and updates the first local increment counter. If the first local increment counter exceeded a threshold value, then the first local increment counter is transmitted to a second peer, and then reset to zero. In response to the first peer receiving a first global counter associated with the first global counter snapshot, the first global counter snapshot is updated with the first global counter.Type: ApplicationFiled: July 6, 2012Publication date: January 9, 2014Inventors: Aman Teja, Vineeth Chandran, Prashant R. Kumar, Sourav Chakraborty
-
Patent number: 8607191Abstract: A method for business process to customized program code mapping in a pre-packaged computing solution can include establishing a connection from a business process to code mapping module executing in memory by a processor of a computer to a source pre-packaged computing solution, extracting both a business process hierarchy (BPH) and customized program code from the source pre-packaged computing solution, storing the BPH and the extracted customized program code in storage coupled to the computer, selecting a business process in the BPH and mapping the selected business process to corresponding portions of the customized program code, and generating and displaying in the computer a dependency graph indicating dependency relationships of the mapped portions of the customized program code for the selected business process of the BPH of the source pre-packaged computing solution.Type: GrantFiled: June 30, 2010Date of Patent: December 10, 2013Assignee: International Business Machines CorporationInventors: Julian T. Dolby, Richard T. Goodwin, Anca A. Ivan, Igor A. Naumov, Manas R. Kumar Singh
-
Patent number: 8558658Abstract: A method and apparatus is provided for configuring a security system. The method includes the steps of providing a plurality of configuration files on a computer readable medium where each configuration file defines an access control system or integrated security system and each configuration file is different than any other configuration file of the plurality of configuration files, presenting the plurality of configuration files to a person on a display, a configuration processor receiving a selection of a configuration file of the plurality of configuration files from the person and the processor automatically configuring an access control system or integrated security system in accordance with the selected configuration file.Type: GrantFiled: December 3, 2009Date of Patent: October 15, 2013Assignee: Honeywell International Inc.Inventors: Aneesh R Kumar, Arunachalam K Sundararaman, Nithyanandhan G Govindaraj, Vinay V Venkatesh
-
Patent number: 8560833Abstract: Providing secure network access in a networked client device. A client device is provided with a secure connection adapter. In operation, the secure connection adapter detects the network environment of the client device and determines of the network environment is trusted or untrusted. If the client device is operating in an untrusted network environment, the secure connection adapter establishes a secure connection to an enterprise host using a secure tunnel such as IPSec, SSL, or other secure connection. Programs executing on the client device now operate in the secure network environment, with all network activity routed through the secure connection to the enterprise. Optionally, a split tunnel mechanism may be used to direct some network traffic directly to the Internet from the client device.Type: GrantFiled: October 29, 2010Date of Patent: October 15, 2013Assignee: Aruba Networks, Inc.Inventors: Chetan R. Kumar, Charumathy Venkatraman, Suman Maradani
-
Patent number: 8549490Abstract: A method for static code analyzing customizations to a pre-packaged computing solution can include establishing a communicative connection from a recommendation generation module to a pre-packaged computing solution and authenticating into the pre-packaged computing solution. Customized program code can be extracted from the pre-packaged computing solution and a call graph of the customized program code can be constructed such that the call graph indicates method calls to different interfaces for program code of the pre-packaged computing solution. Finally, a report can be generated identifying customized program code to be adapted to a new version of the pre-packaged computing solution based upon changes in the different interfaces shown by the call graph to be used in the new version of the pre-packaged computing solution and modifications required for the customized program code to call the different interfaces in the new version of the pre-packaged computing solution.Type: GrantFiled: September 29, 2009Date of Patent: October 1, 2013Assignee: International Business Machines CorporationInventors: Julian T. Dolby, Richard T. Goodwin, Anca Andreea Ivan, Manas R. Kumar Singh
-
Publication number: 20130227164Abstract: A computer-implemented method of providing distributed layer seven traffic shaping includes receiving one or more service requests from one or more clients. The one or more service requests include network usage information associated with the one or more clients. The computer-implemented method also includes aggregating the network usage information from the one or more clients across one or more data centers. Further, the computer-implemented method includes computing a delay required for throttling the service request based on data transferred. Furthermore, the computer-implemented method includes communicating the delay to the one or more clients. Moreover, the computer-implemented method includes throttling the one or more service requests based on the delay across the one or more data centers.Type: ApplicationFiled: February 23, 2012Publication date: August 29, 2013Applicant: Yahoo! Inc.Inventors: Amit KUMAR, Aman TEJA, Pankaj KOTHARI, Prashant R. KUMAR
-
Patent number: 8414678Abstract: A method for generating metallic nanomaterials using acetylenic-bridged metal-carbonyl complexes as a precursor allows control of nanoparticle properties. The novel method produced metallic nanomaterials resistant to oxidation.Type: GrantFiled: September 14, 2007Date of Patent: April 9, 2013Assignee: Board of Supervisors of Lousiana State University And Agricultural and Mechanical CollegeInventors: Challa S. S. R. Kumar, Rohini M. de Silva, Josef Hormes
-
Publication number: 20130041704Abstract: Methods, computer readable media, and apparatuses for managing initiative consolidation are presented. According to one or more aspects, information about at least two new projects may be received. Subsequently, the information may be analyzed to identify one or more commonalities between the at least two new projects. Thereafter, it may be determined, based on the identified commonalities, to bundle the at least two new projects for one or more testing phases. In one or more arrangements, receiving information about the at least two new projects may include extracting, from one or more project design documents, a job listing for each project, where each job listing identifies one or more jobs included in each project. In some arrangements, a cost-benefit analysis may be generated to calculate potential savings associated with bundling the at least two new projects for the one or more testing phases.Type: ApplicationFiled: August 11, 2011Publication date: February 14, 2013Applicant: BANK OF AMERICA CORPORATIONInventors: Claudette Girard, Ashwin B. R. Kumar, Sayee Ram Prasad Balasubramanian
-
Patent number: 8234570Abstract: Harvesting assets for packaged application practices, in one aspect, may include obtaining one or more work products associated with deployment of packaged software applications, extracting content and style, enhancing content and style with models of work products, and storing assets in asset repository.Type: GrantFiled: October 26, 2009Date of Patent: July 31, 2012Assignee: International Business Machines CorporationInventors: Rema Ananthanarayanan, Kathleen Byrnes, Charbak Chatterjee, Maharshi Desai, Pankaj Dhoolia, Sweefen Goh, Richard T. Goodwin, Mangala Gowri, Anca A. Ivan, Juhnyoung Lee, Senthil Kk Mani, Pietro Mazzoleni, Rakesh Mohan, Debdoot Mukherjee, Aubrey J. Rembert, Gerhard Sigl, Manas R. Kumar Singh, Vibha S. Sinha, Biplav Srivastava
-
Publication number: 20120110320Abstract: Providing secure network access in a networked client device. A client device is provided with a secure connection adapter. In operation, the secure connection adapter detects the network environment of the client device and determines of the network environment is trusted or untrusted. If the client device is operating in an untrusted network environment, the secure connection adapter establishes a secure connection to an enterprise host using a secure tunnel such as IPSec, SSL, or other secure connection. Programs executing on the client device now operate in the secure network environment, with all network activity routed through the secure connection to the enterprise. Optionally, a split tunnel mechanism may be used to direct some network traffic directly to the Internet from the client device.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Inventors: Chetan R. Kumar, Charumathy Venkatraman, Suman Maradani
-
Publication number: 20120071162Abstract: As dual-mode phones move within a wireless network, they track which cell tower they are associated with, reporting this information to a mobility controller. The mobility controller builds a list of cell tower identifiers which are associated with the wireless coverage, and makes this list available to subscribing dual-mode phones. Subscribing dual-mode phones can use this list to scan for network availability when they are associated with a cell tower which is on the list.Type: ApplicationFiled: November 29, 2011Publication date: March 22, 2012Inventors: Chetan R. Kumar, Pradeep J. Iyer, Arun Mahajan
-
Publication number: 20120005647Abstract: Embodiments of the present invention provide a method, system and computer program product for business process to customized program code mapping in a pre-packaged computing solution. The method can include establishing a connection from a business process to code mapping module executing in memory by a processor of a computer to a source pre-packaged computing solution, extracting both a business process hierarchy (BPH) and customized program code from the source pre-packaged computing solution and storing the BPH and the extracted customized program code in storage coupled to the computer. The method further can include selecting a business process in the BPH and mapping the selected business process to corresponding portions of the customized program code.Type: ApplicationFiled: June 30, 2010Publication date: January 5, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julian T. Dolby, Richard T. Goodwin, Anca A. Ivan, Igor A. Naumov, Manas R. Kumar Singh
-
Publication number: 20110320456Abstract: The invention provides a method, a system, and a computer program product for managing and distributing knowledge tips in an organization. A member of the organization submits a knowledge tip and one or more data points corresponding to the knowledge tip in a Tips Management System (TiMS). The member associates the knowledge tip with at least one predefined category. A member selects knowledge tips by defining a criterion in TiMS. The member selects category(ies) and/or projects(s) and provides delivery parameters for planning the delivery of knowledge tips to the at least one member. The TiMS delivers the selected knowledge tips to the each member as per the delivery parameters.Type: ApplicationFiled: September 30, 2010Publication date: December 29, 2011Applicant: INFOSYS TECHNOLOGIES LIMITEDInventors: Aparna HARISCHANDRAKAR, Ambreesh KUMAR, Shyam RAJADHYAX, Nikhil GORDIA, Chetan R. KUMAR
-
Patent number: 8068870Abstract: Enterprise location discovery in dual-mode phones. As dual-mode phones move within the enterprise Wi-Fi network, they track which cell tower they are associated with, reporting this information to an enterprise mobility controller. The enterprise mobility controller builds a list of cell tower identifiers which are associated with enterprise Wi-Fi coverage, and makes this list available to subscribing dual-mode phones. Subscribing dual-mode phones can use this list to only scan for Wi-Fi availability when they are associated with a cell tower which is on the list.Type: GrantFiled: April 14, 2008Date of Patent: November 29, 2011Assignee: Aruba Networks, Inc.Inventors: Chetan R. Kumar, Pradeep J. Iyer, Arun Mahajan
-
Publication number: 20110167070Abstract: Reusing assets for packaged software application configurations may include defining one or more query criteria based on information associated with a project, querying an asset repository stored in a storage device using the one or more query criteria, receiving a list of one or more assets from the asset repository in response to the querying, and using the one or more assets on the list to compose a document defining deployment procedures associated with deploying a packaged software application.Type: ApplicationFiled: January 6, 2010Publication date: July 7, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rema Ananthanarayanan, Manisha D. Bhandar, Kathleen Byrnes, Charbak Chatterjee, Shyhkwei Chen, Maharshi Desai, Pankaj Dhoolia, Sweefen Goh, Richard T. Goodwin, Mangala Gowri, Anca A. Ivan, Juhnyoung Lee, Senthil Kk Mani, Pietro Mazzoleni, Rakesh Mohan, Debdoot Mukherjee, Aubrey J. Rembert, Gerhard Sigl, Manas R. Kumar Singh, Vibha S. Sinha, Biplav Srivastava
-
Publication number: 20110133884Abstract: A method and apparatus is provided for configuring a security system. The method includes the steps of providing a plurality of configuration files on a computer readable medium where each configuration file defines an access control system or integrated security system and each configuration file is different than any other configuration file of the plurality of configuration files, presenting the plurality of configuration files to a person on a display, a configuration processor receiving a selection of a configuration file of the plurality of configuration files from the person and the processor automatically configuring an access control system or integrated security system in accordance with the selected configuration file.Type: ApplicationFiled: December 3, 2009Publication date: June 9, 2011Applicant: Honeywell International Inc.Inventors: Aneesh R. Kumar, Arunachalam K. Sundararaman, Nithyanandhan G. Govindaraj, Vinay V. Venkatesh
-
Publication number: 20110099470Abstract: Harvesting assets for packaged application practices, in one aspect, may include obtaining one or more work products associated with deployment of packaged software applications, extracting content and style, enhancing content and style with models of work products, and storing assets in asset repository.Type: ApplicationFiled: October 26, 2009Publication date: April 28, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rema Ananthanarayanan, Kathleen Byrnes, Charbak Chatterjee, Maharshi H. Desai, Pankaj Dhoolia, Sweefen Goh, Richard T. Goodwin, Mangala Gowri, Anca A. Ivan, Juhnyoung Lee, Senthil Kk Mani, Pietro Mazzoleni, Rakesh Mohan, Debdoot Mukherjee, Aubrey J. Rembert, Gerhard Sigl, Manas R. Kumar Singh, Vibha S. Sinha, Biplav Srivastava
-
Publication number: 20110078667Abstract: A method for static code analyzing customizations to a pre-packaged computing solution can include establishing a communicative connection from a recommendation generation module to a pre-packaged computing solution and authenticating into the pre-packaged computing solution. Customized program code can be extracted from the pre-packaged computing solution and a call graph of the customized program code can be constructed such that the call graph indicates method calls to different interfaces for program code of the pre-packaged computing solution. Finally, a report can be generated identifying customized program code to be adapted to a new version of the pre-packaged computing solution based upon changes in the different interfaces shown by the call graph to be used in the new version of the pre-packaged computing solution and modifications required for the customized program code to call the different interfaces in the new version of the pre-packaged computing solution.Type: ApplicationFiled: September 29, 2009Publication date: March 31, 2011Applicant: International Business Machines CorporationInventors: Julian T. Dolby, Richard T. Goodwin, Anca Andreea Ivan, Manas R. Kumar Singh
-
Publication number: 20090258668Abstract: Enterprise location discovery in dual-mode phones. As dual-mode phones move within the enterprise Wi-Fi network, they track which cell tower they are associated with, reporting this information to an enterprise mobility controller. The enterprise mobility controller builds a list of cell tower identifiers which are associated with enterprise Wi-Fi coverage, and makes this list available to subscribing dual-mode phones. Subscribing dual-mode phones can use this list to only scan for Wi-FI availability when they are associated with a cell tower which is on the list.Type: ApplicationFiled: April 14, 2008Publication date: October 15, 2009Applicant: ARUBA NETWORKS, INC.Inventors: Chetan R. Kumar, Pradeep J. Iyer, Arun Mahajan
-
Patent number: 7515972Abstract: An apparatus includes a memory capable of storing information defining multiple function block types. A combination of instances of one or more function block types is capable of implementing a control process in a controller within a process control system. The apparatus also includes a function block editor capable of allowing a user to dynamically create or modify one or more of the function block types using a graphical user interface. The function block editor is capable of allowing the user to define one or more parameters for a function block type being created or modified.Type: GrantFiled: October 28, 2005Date of Patent: April 7, 2009Assignee: Honeywell International Inc.Inventors: Ravi R. Kumar, Mohamed F. M. Saleem Jahaber, Cathleen F. Kilpatrick