Patents by Inventor Rajendra Kumar
Rajendra Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12360878Abstract: A system generates a recommendation that includes at least one action to address at least one root cause anomaly that causes other anomalies occurred within a distributed system. The at least one root cause anomaly is determined by at least using a graph that represents the distributed system and metrics that are associated with the distributed system.Type: GrantFiled: September 30, 2022Date of Patent: July 15, 2025Assignee: Amazon Technologies, Inc.Inventors: Rajendra Kumar Vippagunta, Sunayana Vempati, Syed Furqhan Ulla, Yekesa Srinivasa Kosuru, Namita Das, Devesh Ratho, Shashwat Srijan, Lenon Alexander Minorics, Patrick Bloebaum, David Kernert
-
Publication number: 20250195692Abstract: Disclosed are methods of treating an eye disease by administering a recombinant adeno-associated virus (AAV) vector that encodes the proteoglycan decorin to the eye of a subject. Also provided are animal models of glaucoma that are generated using a recombinant AAV vector that encodes a constitutively active variant of transforming growth factor beta 2 (TGF?2CS).Type: ApplicationFiled: December 16, 2024Publication date: June 19, 2025Inventor: Rajendra Kumar-Singh
-
Publication number: 20250175423Abstract: Load aware routing is performed for requests to managed network endpoints for heterogeneous machine learning models. A request to generate an inference is received via a managed network endpoint that invokes a specified machine learning model. Workloads of the different hosts for respective replicas of the machine learning model are evaluated to select one of the hosts to perform the request.Type: ApplicationFiled: November 24, 2023Publication date: May 29, 2025Applicant: Amazon Technologies, Inc.Inventors: Rajendra Kumar Vippagunta, Aaron Keller, Tianxing Zhou, Zhi Cong Tan, Saurabh Mukund Trikande, David Nigenda, Xu Deng, Lakshmi Naarayanan Ramakrishnan, Deepti Laxman Ragha
-
Publication number: 20250173183Abstract: Dynamic endpoint management is performed for heterogenous machine learning models. A placement event is detected for a machine learning model associated with a managed network endpoint. The managed network endpoint may provide access to different machine learning models via requests to invoke specified ones of the machine learning models received from clients of the machine learning service. A computing resource is selecting from the associated computing resources based on a determination that the computing resources satisfies a resource requirement for the machine learning model and the machine learning model is placed on the selected computing resource.Type: ApplicationFiled: November 24, 2023Publication date: May 29, 2025Applicant: Amazon Technologies, Inc.Inventors: Saurabh Mukund Trikande, Zhi Cong Tan, David Nigenda, Lakshmi Naarayanan Ramakrishnan, Rajendra Kumar Vippagunta, Xu Deng, Aakash Pydi, Shruti Sharma, Ashish Gupta, Shrijeet Jagadishchandra Joshi, Deepti Laxman Ragha, Wenzhao Sun, Kunal Shailesh Shah, Shikher Mishra, Jiaping Wang
-
Publication number: 20250168660Abstract: An overall network performance effectiveness improvement device that is configured to improve overall network performance based on a network availability level, a network capacity level, and/or a network quality level. The device may be configured to receive network availability data, network capacity data, and network quality data and calculate a network availability level, a network capacity level, and a network quality level based on such network availability data, network capacity data, and network quality data, to determine whether the calculated overall network performance effectiveness level is below a predetermined threshold overall network performance effectiveness level, and to cause a network improvement control event that is configured to improve overall network performance effectiveness of the network if the overall network performance effectiveness level is below a predetermined threshold overall network performance effectiveness level.Type: ApplicationFiled: November 18, 2024Publication date: May 22, 2025Applicant: Belden Inc.Inventors: Michael S. FISHER, Aravind Rajendra KUMAR
-
Patent number: 12278747Abstract: A system obtains a graph representing a set of resources of a distributed system. At least one node of the graph represents a resource-metric pair. The system further obtains time series data that indicates anomalies from the system. Then, the system determines a root cause anomaly that caused other anomalies based at least in part on the graph and the time series data.Type: GrantFiled: September 30, 2022Date of Patent: April 15, 2025Assignee: Amazon Technologies, Inc.Inventors: Rajendra Kumar Vippagunta, Syed Furqhan Ulla, Sunayana Vempati, Yekesa Srinivasa Kosuru, Namita Das, Devesh Ratho, Shashwat Srijan, Lenon Alexander Minorics, Patrick Bloebaum, David Kernert
-
Patent number: 12254180Abstract: Disclosed is a storage system comprising: receiving a first data segment and first metadata associated with the first data segment to be stored in the storage system; storing the first data segment and the first metadata in a persistent storage device of the storage system; compressing the first data segment using a predetermined compression algorithm to generate a first compressed data segment; and storing the first metadata and the first compressed data segment in a solid state drive (SSD) cache device of the storage system, including aligning the first metadata and the first compressed data segment to a page boundary of the SSD device to reduce a number of input and output (IO) operations required for accessing the first metadata and the first compressed data segment from the SSD cache device.Type: GrantFiled: January 25, 2022Date of Patent: March 18, 2025Assignee: DELL PRODUCTS L.P.Inventors: Nitin Madan, Kedar Godbole, Sandeep Nirmale, Rajendra Kumar Bhairy Raj
-
Patent number: 12242397Abstract: Disclosed herein is a computerized method for emulating processing of a peripheral device including operations of providing an insertion emulation signal to a computing device emulating insertion of the peripheral device to a port of the computing device, intercepting a request for a device descriptor of the peripheral device from a PnP manager operating on the computing device, providing a device descriptor of the peripheral device to the PnP manager, wherein the PnP manager is configured to enumerate the emulated peripheral device, intercepting one or more universal serial bus (USB) request blocks (URBs) from the PnP manager, and responsive to each of the one or more URBs, providing a response to the PnP manager. The insertion emulation signal may emulate a voltage transition on a data line of the port of the computing device. The peripheral device may adhere to a USB standard.Type: GrantFiled: November 17, 2022Date of Patent: March 4, 2025Assignee: Musarubra US LLCInventors: John Teddy, Imityaz Yunus Pathan, Raja Kannan, Vinoo Thomas, Rajendra Kumar Sharma
-
Publication number: 20250045125Abstract: A method to generate sustainability metric for nodes that are configured to potentially execute a network function such as an application programming interface, and to use the sustainability metric to select one of the nodes to execute the network function. The method includes receiving sustainability information for a first node and a second node in a plurality of nodes configured to execute at least part of a predetermined network function, receiving sustainability information for a location at which the first node and the second node are respectively disposed, for a given workload to be executed by the predetermined network function, generating a sustainability metric for the first node and the second node, and selecting, based on the sustainability metric, one of the first node and the second node to execute the predetermined network function.Type: ApplicationFiled: August 4, 2023Publication date: February 6, 2025Inventors: Praveen Iyengar, Alhad Shrikant Rajurwar, Tejasvi Kashyap, Rajendra Kumar Thirumurthi
-
Patent number: 12206709Abstract: A method of managing security rules may include extracting metadata from a data packet received at a first network device. The metadata including network metadata and network system metadata. The method may further include distributing the metadata to at least one service endpoint registered with the first network device, receiving from the at least one service endpoint, an indication as to how traffic associated with the data packet is to be handled, and enabling the traffic based at least in part on feedback received from the at least one service endpoint and creating a first service flow hash entry of a hash table associated with the data packet at the first network device. The first service flow hash entry identified each of a number of services using a unique number. The method may further include distributing the hash table including the first service flow hash entry across a fabric to at least a second network device.Type: GrantFiled: July 29, 2022Date of Patent: January 21, 2025Assignee: Cisco Technology, Inc.Inventors: Rajendra Kumar Thirumurthi, Praveen parthasarathy Iyengar
-
Publication number: 20240398898Abstract: Methods, compositions and kits for regulating complement activity or treating a complement activity disorder in a subject using soluble, membrane-independent CD59 protein, methods of assaying human macular degeneration (MD), and methods and kits for assaying potential therapeutic agents for treatment of human MD are provided herein.Type: ApplicationFiled: May 31, 2024Publication date: December 5, 2024Inventors: Rajendra Kumar-Singh, Siobhan M. Cashman, Kasmir Ramo
-
Publication number: 20240356869Abstract: In an example, a network switch is configured to natively act as a high-speed load balancer. Numerous load-balancing techniques may be used, including one that bases the traffic “bucket” on a source IP address of an incoming packet. This particular technique provides a network administrator a powerful tool for shaping network traffic. For example, by assigning certain classes of computers on the network particular IP addresses, the network administrator can ensure that the traffic is load balanced in a desirable fashion. To further increase flexibility, the network administrator may apply a bit mask to the IP address, and expose only a portion, selected from a desired octet of the address.Type: ApplicationFiled: June 27, 2024Publication date: October 24, 2024Inventors: Rajendra Kumar Thirumurthi, Samar Sharma, Mouli Vytla
-
Publication number: 20240354376Abstract: Methods, systems, and apparatuses include receiving input of a selection from a client device providing a graphical user interface and a recommendation interface, where the input of the selection includes an explicit attribute. Implicit attribute suggestions are generated based on the explicit attribute. The implicit attribute suggestions are sent to the client device. Attribute selections including at least one implicit attribute suggestion are received from the client device. Prompts are created based on the attribute selections. A generative language model is applied to the prompts. Content including a suggested user recommendation for the first user profile is output by the generative language model based on the prompts. The suggested user recommendation is sent to the client device to cause the suggested user recommendation to be presented on the recommendation interface.Type: ApplicationFiled: June 12, 2023Publication date: October 24, 2024Inventors: Abhas Tandon, Priyanka Jain Rajendra Kumar, Ashish Kumar, Rakhi Kumari, Kartikeya Shivanand Puri
-
Publication number: 20240346496Abstract: A method of constructing a set of motifs for use in detecting messages of interest in a network of nodes is provided, the method comprising controlling circuitry to: acquire target data, the target data comprising a set of messages which have been exchanged between nodes in the network, the set of messages including a number of messages of interest; acquire control data, the control data comprising a set of messages which have been produced based on a random exchange of messages between nodes in the network; detect motifs within the target data and the control data, each motif being a repeated pattern of messages appearing within either the target data and/or the control data; generate a set of values indicative of a significance of the motifs which have been detected in the target data and the motifs which have been detected in the control data using a frequency with which these motifs have been detected; and construct a set of motifs for use in detecting messages of interest in the network using the set ofType: ApplicationFiled: August 2, 2022Publication date: October 17, 2024Inventors: Prina Rajendra Kumar Patel, Michael Alan Dewer
-
Publication number: 20240340293Abstract: The present disclosure concerns a computer-implemented method for reconstructing a dataset after detection of a network security threat in a network. The method comprises: determining a maximum flow for returning data associated with the network security threat to a source dataset via each of a plurality of paths through which the data has passed from the source dataset to the destination dataset; starting from the destination dataset, determining the data to be transferred to each dataset in the plurality of paths between the destination dataset and the one or more source datasets such that the data can be returned to the one or more source datasets, the data transferred in each path not exceeding the determined maximum flow for the path; adding the details of the determined amount of data to be transferred to a forensic report; and outputting the forensic report.Type: ApplicationFiled: June 17, 2024Publication date: October 10, 2024Inventors: Prina Rajendra Kumar Patel, David William Divitt, James Hogan, Szymon Nikodem Prajs
-
Patent number: 12107776Abstract: In an example, a network switch is configured to natively act as a high-speed load balancer. Numerous load-balancing techniques may be used, including one that bases the traffic “bucket” on a source IP address of an incoming packet. This particular technique provides a network administrator a powerful tool for shaping network traffic. For example, by assigning certain classes of computers on the network particular IP addresses, the network administrator can ensure that the traffic is load balanced in a desirable fashion. To further increase flexibility, the network administrator may apply a bit mask to the IP address, and expose only a portion, selected from a desired octet of the address.Type: GrantFiled: July 11, 2022Date of Patent: October 1, 2024Assignee: Cisco Technology, Inc.Inventors: Rajendra Kumar Thirumurthi, Samar Sharma, Mouli Vytla
-
Patent number: 12067532Abstract: A system and method for configuring an application is described. The system identifies user collaboration data of users of an application. The user collaboration data indicates durations of collaborations between one or more users using the application. The system computes an influencer score of a first user based on the duration of collaborations between the first user and the other users. The system determines that the influencer score of the first user exceeds an influencer score threshold and generates a configuration setting of the application for the first user. The system applies the configuration setting to the application for the first user.Type: GrantFiled: May 21, 2020Date of Patent: August 20, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Sanjay Hemmige Ramaswamy, Jagadeesh Virupaksha Huliyar, Sreeram Nivarthi, Ritu Lakhotia, Vindana Madhuwantha, Apurva Bharatkumar Shah, Ganesh Jaiswal, Siddarth Rajendra Kumar, V. S. Srujana Oruganti, Vishnu Gajendran, Sai Sumana Pagidipalli, Sunil Kumar, Nimesh Ravindra Desai, Nishtha Mehrotra, Diego Fernando Suarez Castillo, Neha Parikh Shah, Aaron James Harrison, Tannaz Sattari Tabrizi, Aleksey Y. Ashikhmin, Carlos Andres Morales Torrado, Amit Prem Manghani, Sida Peng
-
Patent number: 12015620Abstract: The present disclosure concerns a computer-implemented method for reconstructing a dataset after detection of a network security threat in a network. The method comprises: determining a maximum flow for returning data associated with the network security threat to a source dataset via each of a plurality of paths through which the data has passed from the source dataset to the destination dataset; starting from the destination dataset, determining the data to be transferred to each dataset in the plurality of paths between the destination dataset and the one or more source datasets such that the data can be returned to the one or more source datasets, the data transferred in each path not exceeding the determined maximum flow for the path; adding the details of the determined amount of data to be transferred to a forensic report; and outputting the forensic report.Type: GrantFiled: June 25, 2021Date of Patent: June 18, 2024Assignee: VOCALINK LIMITEDInventors: Prina Rajendra Kumar Patel, David William Divitt, James Hogan, Szymon Nikodem Prajs
-
Publication number: 20240094696Abstract: A building controller includes a housing and a plurality of wiring terminals that are secured relative to the housing and are physically accessible from outside of the housing. A controller is housed by the housing and is operatively coupled to the plurality of wiring terminals. The controller is field programmable to set each of two or more of the plurality of wiring terminals to a particular one of a plurality of wiring terminal types including an input wiring terminal type, an output wiring terminal type, and a communication wiring terminal type where the communication wiring terminal type operates in accordance with a predetermined communication protocol.Type: ApplicationFiled: September 20, 2022Publication date: March 21, 2024Inventors: Prashanth Nadesan, Rajendra Kumar S, Suresh Vemuri
-
Publication number: 20240039957Abstract: A method of managing security rules may include extracting metadata from a data packet received at a first network device. The metadata including network metadata and network system metadata. The method may further include distributing the metadata to at least one service endpoint registered with the first network device, receiving from the at least one service endpoint, an indication as to how traffic associated with the data packet is to be handled, and enabling the traffic based at least in part on feedback received from the at least one service endpoint and creating a first service flow hash entry of a hash table associated with the data packet at the first network device. The first service flow hash entry identified each of a number of services using a unique number. The method may further include distributing the hash table including the first service flow hash entry across a fabric to at least a second network device.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Applicant: Cisco Technology, Inc.Inventors: Rajendra Kumar Thirumurthi, Praveen parthasarathy Iyengar