Patents by Inventor Rajendra Kumar
Rajendra Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12278747Abstract: A system obtains a graph representing a set of resources of a distributed system. At least one node of the graph represents a resource-metric pair. The system further obtains time series data that indicates anomalies from the system. Then, the system determines a root cause anomaly that caused other anomalies based at least in part on the graph and the time series data.Type: GrantFiled: September 30, 2022Date of Patent: April 15, 2025Assignee: Amazon Technologies, Inc.Inventors: Rajendra Kumar Vippagunta, Syed Furqhan Ulla, Sunayana Vempati, Yekesa Srinivasa Kosuru, Namita Das, Devesh Ratho, Shashwat Srijan, Lenon Alexander Minorics, Patrick Bloebaum, David Kernert
-
Patent number: 12254180Abstract: Disclosed is a storage system comprising: receiving a first data segment and first metadata associated with the first data segment to be stored in the storage system; storing the first data segment and the first metadata in a persistent storage device of the storage system; compressing the first data segment using a predetermined compression algorithm to generate a first compressed data segment; and storing the first metadata and the first compressed data segment in a solid state drive (SSD) cache device of the storage system, including aligning the first metadata and the first compressed data segment to a page boundary of the SSD device to reduce a number of input and output (IO) operations required for accessing the first metadata and the first compressed data segment from the SSD cache device.Type: GrantFiled: January 25, 2022Date of Patent: March 18, 2025Assignee: DELL PRODUCTS L.P.Inventors: Nitin Madan, Kedar Godbole, Sandeep Nirmale, Rajendra Kumar Bhairy Raj
-
Patent number: 12242397Abstract: Disclosed herein is a computerized method for emulating processing of a peripheral device including operations of providing an insertion emulation signal to a computing device emulating insertion of the peripheral device to a port of the computing device, intercepting a request for a device descriptor of the peripheral device from a PnP manager operating on the computing device, providing a device descriptor of the peripheral device to the PnP manager, wherein the PnP manager is configured to enumerate the emulated peripheral device, intercepting one or more universal serial bus (USB) request blocks (URBs) from the PnP manager, and responsive to each of the one or more URBs, providing a response to the PnP manager. The insertion emulation signal may emulate a voltage transition on a data line of the port of the computing device. The peripheral device may adhere to a USB standard.Type: GrantFiled: November 17, 2022Date of Patent: March 4, 2025Assignee: Musarubra US LLCInventors: John Teddy, Imityaz Yunus Pathan, Raja Kannan, Vinoo Thomas, Rajendra Kumar Sharma
-
Publication number: 20250045125Abstract: A method to generate sustainability metric for nodes that are configured to potentially execute a network function such as an application programming interface, and to use the sustainability metric to select one of the nodes to execute the network function. The method includes receiving sustainability information for a first node and a second node in a plurality of nodes configured to execute at least part of a predetermined network function, receiving sustainability information for a location at which the first node and the second node are respectively disposed, for a given workload to be executed by the predetermined network function, generating a sustainability metric for the first node and the second node, and selecting, based on the sustainability metric, one of the first node and the second node to execute the predetermined network function.Type: ApplicationFiled: August 4, 2023Publication date: February 6, 2025Inventors: Praveen Iyengar, Alhad Shrikant Rajurwar, Tejasvi Kashyap, Rajendra Kumar Thirumurthi
-
Patent number: 12206709Abstract: A method of managing security rules may include extracting metadata from a data packet received at a first network device. The metadata including network metadata and network system metadata. The method may further include distributing the metadata to at least one service endpoint registered with the first network device, receiving from the at least one service endpoint, an indication as to how traffic associated with the data packet is to be handled, and enabling the traffic based at least in part on feedback received from the at least one service endpoint and creating a first service flow hash entry of a hash table associated with the data packet at the first network device. The first service flow hash entry identified each of a number of services using a unique number. The method may further include distributing the hash table including the first service flow hash entry across a fabric to at least a second network device.Type: GrantFiled: July 29, 2022Date of Patent: January 21, 2025Assignee: Cisco Technology, Inc.Inventors: Rajendra Kumar Thirumurthi, Praveen parthasarathy Iyengar
-
Publication number: 20240398898Abstract: Methods, compositions and kits for regulating complement activity or treating a complement activity disorder in a subject using soluble, membrane-independent CD59 protein, methods of assaying human macular degeneration (MD), and methods and kits for assaying potential therapeutic agents for treatment of human MD are provided herein.Type: ApplicationFiled: May 31, 2024Publication date: December 5, 2024Inventors: Rajendra Kumar-Singh, Siobhan M. Cashman, Kasmir Ramo
-
Publication number: 20240356869Abstract: In an example, a network switch is configured to natively act as a high-speed load balancer. Numerous load-balancing techniques may be used, including one that bases the traffic “bucket” on a source IP address of an incoming packet. This particular technique provides a network administrator a powerful tool for shaping network traffic. For example, by assigning certain classes of computers on the network particular IP addresses, the network administrator can ensure that the traffic is load balanced in a desirable fashion. To further increase flexibility, the network administrator may apply a bit mask to the IP address, and expose only a portion, selected from a desired octet of the address.Type: ApplicationFiled: June 27, 2024Publication date: October 24, 2024Inventors: Rajendra Kumar Thirumurthi, Samar Sharma, Mouli Vytla
-
Publication number: 20240354376Abstract: Methods, systems, and apparatuses include receiving input of a selection from a client device providing a graphical user interface and a recommendation interface, where the input of the selection includes an explicit attribute. Implicit attribute suggestions are generated based on the explicit attribute. The implicit attribute suggestions are sent to the client device. Attribute selections including at least one implicit attribute suggestion are received from the client device. Prompts are created based on the attribute selections. A generative language model is applied to the prompts. Content including a suggested user recommendation for the first user profile is output by the generative language model based on the prompts. The suggested user recommendation is sent to the client device to cause the suggested user recommendation to be presented on the recommendation interface.Type: ApplicationFiled: June 12, 2023Publication date: October 24, 2024Inventors: Abhas Tandon, Priyanka Jain Rajendra Kumar, Ashish Kumar, Rakhi Kumari, Kartikeya Shivanand Puri
-
Publication number: 20240346496Abstract: A method of constructing a set of motifs for use in detecting messages of interest in a network of nodes is provided, the method comprising controlling circuitry to: acquire target data, the target data comprising a set of messages which have been exchanged between nodes in the network, the set of messages including a number of messages of interest; acquire control data, the control data comprising a set of messages which have been produced based on a random exchange of messages between nodes in the network; detect motifs within the target data and the control data, each motif being a repeated pattern of messages appearing within either the target data and/or the control data; generate a set of values indicative of a significance of the motifs which have been detected in the target data and the motifs which have been detected in the control data using a frequency with which these motifs have been detected; and construct a set of motifs for use in detecting messages of interest in the network using the set ofType: ApplicationFiled: August 2, 2022Publication date: October 17, 2024Inventors: Prina Rajendra Kumar Patel, Michael Alan Dewer
-
Publication number: 20240340293Abstract: The present disclosure concerns a computer-implemented method for reconstructing a dataset after detection of a network security threat in a network. The method comprises: determining a maximum flow for returning data associated with the network security threat to a source dataset via each of a plurality of paths through which the data has passed from the source dataset to the destination dataset; starting from the destination dataset, determining the data to be transferred to each dataset in the plurality of paths between the destination dataset and the one or more source datasets such that the data can be returned to the one or more source datasets, the data transferred in each path not exceeding the determined maximum flow for the path; adding the details of the determined amount of data to be transferred to a forensic report; and outputting the forensic report.Type: ApplicationFiled: June 17, 2024Publication date: October 10, 2024Inventors: Prina Rajendra Kumar Patel, David William Divitt, James Hogan, Szymon Nikodem Prajs
-
Patent number: 12107776Abstract: In an example, a network switch is configured to natively act as a high-speed load balancer. Numerous load-balancing techniques may be used, including one that bases the traffic “bucket” on a source IP address of an incoming packet. This particular technique provides a network administrator a powerful tool for shaping network traffic. For example, by assigning certain classes of computers on the network particular IP addresses, the network administrator can ensure that the traffic is load balanced in a desirable fashion. To further increase flexibility, the network administrator may apply a bit mask to the IP address, and expose only a portion, selected from a desired octet of the address.Type: GrantFiled: July 11, 2022Date of Patent: October 1, 2024Assignee: Cisco Technology, Inc.Inventors: Rajendra Kumar Thirumurthi, Samar Sharma, Mouli Vytla
-
Patent number: 12067532Abstract: A system and method for configuring an application is described. The system identifies user collaboration data of users of an application. The user collaboration data indicates durations of collaborations between one or more users using the application. The system computes an influencer score of a first user based on the duration of collaborations between the first user and the other users. The system determines that the influencer score of the first user exceeds an influencer score threshold and generates a configuration setting of the application for the first user. The system applies the configuration setting to the application for the first user.Type: GrantFiled: May 21, 2020Date of Patent: August 20, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Sanjay Hemmige Ramaswamy, Jagadeesh Virupaksha Huliyar, Sreeram Nivarthi, Ritu Lakhotia, Vindana Madhuwantha, Apurva Bharatkumar Shah, Ganesh Jaiswal, Siddarth Rajendra Kumar, V. S. Srujana Oruganti, Vishnu Gajendran, Sai Sumana Pagidipalli, Sunil Kumar, Nimesh Ravindra Desai, Nishtha Mehrotra, Diego Fernando Suarez Castillo, Neha Parikh Shah, Aaron James Harrison, Tannaz Sattari Tabrizi, Aleksey Y. Ashikhmin, Carlos Andres Morales Torrado, Amit Prem Manghani, Sida Peng
-
Patent number: 12015620Abstract: The present disclosure concerns a computer-implemented method for reconstructing a dataset after detection of a network security threat in a network. The method comprises: determining a maximum flow for returning data associated with the network security threat to a source dataset via each of a plurality of paths through which the data has passed from the source dataset to the destination dataset; starting from the destination dataset, determining the data to be transferred to each dataset in the plurality of paths between the destination dataset and the one or more source datasets such that the data can be returned to the one or more source datasets, the data transferred in each path not exceeding the determined maximum flow for the path; adding the details of the determined amount of data to be transferred to a forensic report; and outputting the forensic report.Type: GrantFiled: June 25, 2021Date of Patent: June 18, 2024Assignee: VOCALINK LIMITEDInventors: Prina Rajendra Kumar Patel, David William Divitt, James Hogan, Szymon Nikodem Prajs
-
Publication number: 20240094696Abstract: A building controller includes a housing and a plurality of wiring terminals that are secured relative to the housing and are physically accessible from outside of the housing. A controller is housed by the housing and is operatively coupled to the plurality of wiring terminals. The controller is field programmable to set each of two or more of the plurality of wiring terminals to a particular one of a plurality of wiring terminal types including an input wiring terminal type, an output wiring terminal type, and a communication wiring terminal type where the communication wiring terminal type operates in accordance with a predetermined communication protocol.Type: ApplicationFiled: September 20, 2022Publication date: March 21, 2024Inventors: Prashanth Nadesan, Rajendra Kumar S, Suresh Vemuri
-
Publication number: 20240039957Abstract: A method of managing security rules may include extracting metadata from a data packet received at a first network device. The metadata including network metadata and network system metadata. The method may further include distributing the metadata to at least one service endpoint registered with the first network device, receiving from the at least one service endpoint, an indication as to how traffic associated with the data packet is to be handled, and enabling the traffic based at least in part on feedback received from the at least one service endpoint and creating a first service flow hash entry of a hash table associated with the data packet at the first network device. The first service flow hash entry identified each of a number of services using a unique number. The method may further include distributing the hash table including the first service flow hash entry across a fabric to at least a second network device.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Applicant: Cisco Technology, Inc.Inventors: Rajendra Kumar Thirumurthi, Praveen parthasarathy Iyengar
-
Publication number: 20240005177Abstract: Monitoring may be performed for time series prediction models. Data to generate a new time series forecast may be received. A determination may be made that the data is associated with a previously generated time series forecast by a machine learning model. Performance metrics may be generated for the machine learning model according to a comparison of the data with the previously generated time series forecast. The performance metrics can then be provided for further analysis and action.Type: ApplicationFiled: June 30, 2022Publication date: January 4, 2024Applicant: Amazon Technologies, Inc.Inventors: Adarsh Singh, Rajendra Kumar Vippagunta, Jitendra Bangani, Namita Das, Xiufeng Zhao, Narayan Agrawal
-
Publication number: 20230414714Abstract: Compositions, methods and kits are provided for treating complement related disorders in a subject with protein in combination having protein fusions of at least two of a CD46 protein, a CD55 protein and a CD59 protein or with a recombinant chimeric protein having at least two of a CD46 protein, a CD55 protein and a CD59 protein or with nucleic acids encoding these proteins. The composition negatively modulates classical and alternative complement pathways thereby treating complement related disorder such as macular degeneration, age-related macular degeneration, diabetic retinopathy, inflammatory bowel disease, thyroiditis, cryoglobulinaemia, fetal loss, organ graft rejection, cancer, etc.Type: ApplicationFiled: May 19, 2023Publication date: December 28, 2023Inventors: Rajendra Kumar-Singh, Derek Leaderer, Siobhan Cashman
-
Patent number: 11843658Abstract: In one embodiment, load balancing criteria and an indication of a plurality of network nodes is received. A plurality of forwarding entries are created based on the load balancing criteria and the indication of the plurality of nodes. A content addressable memory of a network element is programmed with the plurality of forwarding entries. The network element selectively load balances network traffic by applying the plurality of forwarding entries to the network traffic, wherein network traffic meeting the load balancing criteria is load balanced among the plurality of network nodes.Type: GrantFiled: September 9, 2021Date of Patent: December 12, 2023Assignee: Cisco Technology, Inc.Inventors: Samar Sharma, Mouli Vytla, Rajendra Kumar Thirumurthi
-
Publication number: 20230387969Abstract: Systems, methods, and devices select antennas to enhance the range and throughput of wireless communications devices. Methods include identifying a plurality of combinations of antennas based on a plurality of available antennas for a wireless communications device, and generating, using a processing device included in a multiple-input-multiple-output (MIMO) device, a plurality of quality metrics including at least one quality metric for each of the identified combinations of antennas, where each of the at least one quality metrics represents a signal quality of a signal associated with each of the plurality of antennas, and wherein the signal is a spatial stream. Methods further include selecting at least two antennas from the plurality of combinations of antennas based, at least in part, on the plurality of quality metrics, where the at least two antennas are selected for use by the wireless communications device during a transmitting or receiving operation.Type: ApplicationFiled: May 26, 2023Publication date: November 30, 2023Applicant: Cypress Semiconductor CorporationInventors: Prasanna Sethuraman, Visakh Asok, Paul Strauch, Rajendra Kumar Gundu Rao, Ayush Sood
-
Patent number: 11823014Abstract: A method for machine learning based database management is provided. The method may include training a machine learning model to detect an anomaly that is present and/or developing in a database system. The anomaly in the database system may be detected by at least processing, with a trained machine learning model, one or more performance metrics for the database system. In response to detecting the presence of the anomaly at the database system, one or more remedial actions may be determined for correcting and/or preventing the anomaly at the database system. The one or more remedial actions may further be sent to a database management system associated with the database system. Related systems and articles of manufacture are also provided.Type: GrantFiled: November 21, 2018Date of Patent: November 21, 2023Assignee: SAP SEInventors: Rajendra Kumar, Heinz Wolf, Lohit Kumar A. P, Venkatesh R