Patents by Inventor Rama R. Bisa
Rama R. Bisa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240103846Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include first and second Remote Access Controllers (RACs) that each includes computer-executable instructions to receive, by the first RAC, a firmware update image associated with the firmware device, and commence transfer of the firmware update image to the firmware device to perform a firmware update on the firmware device using an update mode that restricts another update request to the firmware device until the first RAC finishes or cancels the firmware update. When the transfer is halted prior to completion, the program instructions cause the second RAC to determine where the firmware update image transfer was halted, and commence transferring the remainder of the firmware update image that has not yet been transferred to the firmware device.Type: ApplicationFiled: September 23, 2022Publication date: March 28, 2024Applicant: Dell Products, L.P.Inventors: Deepaganesh Paulraj, Rama Rao Bisa, Rajeshkumar Ichchhubhai Patel, Mahesh Babu Ramaiah, Pavan Kumar Gavvala, Naveen Karthick Chandrasekaran, Chandrasekhar R
-
Publication number: 20240103844Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include first and second Remote Access Controllers (RACs) that each includes computer-executable instructions to receive a firmware update image associated with the firmware device, and gather data associated with a behavior of the firmware device following the firmware update after the firmware device is updated with the firmware update image. Using the data, the instructions generate a score for the firmware update based at least in part, on the behavior of the IHS following the firmware update.Type: ApplicationFiled: September 23, 2022Publication date: March 28, 2024Applicant: Dell Products, L.P.Inventors: Chandrasekhar R, Rochak Gupta, Rama Rao Bisa, Deepaganesh Paulraj, Sandesh Hadhimane Balakrishna
-
Publication number: 20240103849Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to receive a firmware update image associated with the firmware device, determine that the firmware update image possesses a critical sub-image portion, and schedule a firmware update to be performed in the future on the firmware device using the one firmware update image. The firmware update image conforms to a Platform Level Data Model (PLDM) protocol that is configured to perform rebootless firmware updates.Type: ApplicationFiled: September 27, 2022Publication date: March 28, 2024Applicant: Dell Products, L.P.Inventors: Manjunath Vishwanath, Rama Rao Bisa, Pavan Kumar Gavvala, Manjunath AM, Shantanu Kumar Pradhan, Chandrasekhar R
-
Publication number: 20240103848Abstract: Embodiments of systems and methods to identify and remediate performance degradation during firmware update in a cluster environment are described. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to receive a request to perform a firmware update on a plurality of computing devices of a computing cluster, obtain an inventory of the computing cluster, and determine a scheduling sequence for updating the computing devices so that the performance of the cluster is optimally maintained. The instructions may then perform the firmware update on each of the computing devices according to the determined scheduling sequence.Type: ApplicationFiled: September 26, 2022Publication date: March 28, 2024Applicant: Dell Products, L.P.Inventors: Pavan Kumar Gavvala, Chandrasekhar R, Rama Rao Bisa, Shantanu Kumar Pradhan
-
Patent number: 11210430Abstract: A system includes a storage device having a first encryption protocol, and a controller having a second encryption protocol. A processor implements the first encryption protocol or the second encryption protocol based on a strength of each encryption protocol, a topology of the system, a federal information processing standard certification status, a virtualization support, a multi-key support, a multi-band support, and an enterprise key management server support. Storage transactions may be encrypted using the implemented encryption protocol.Type: GrantFiled: April 2, 2019Date of Patent: December 28, 2021Assignee: Dell Products L.P.Inventors: Chitrak Gupta, Rama R. Bisa, Manjunath Vishwanath, Chandrashekar Nelogal
-
Patent number: 10877539Abstract: An information handling system includes first and second power supplies, and a management controller. The power supplies are configured to operate in a first power mode to supply power to the information handling system and in a second power mode to shut down from supplying power to the information handling system. The management controller is configured in a normal operation mode to set the first power supply to the first power mode and set the second power supply in the second power mode. The management controller is configured in a test operation mode to set the second power supply to the first power mode, to set the first power supply to the second power mode, to determine whether the second power supply is operating within a first limit, and when the second power supply is not operating within the first limit, to provide a first indication that the second power supply is failing.Type: GrantFiled: April 23, 2018Date of Patent: December 29, 2020Assignee: Dell Products, L.P.Inventors: Santosh Kumar Sahu, Rama R. Bisa, Sunil Lingappa, Ajaya K. Senapati, Vaideeswaran Ganesan
-
Publication number: 20200320226Abstract: A system includes a storage device having a first encryption protocol, and a controller having a second encryption protocol. A processor implements the first encryption protocol or the second encryption protocol based on a strength of each encryption protocol, a topology of the system, a federal information processing standard certification status, a virtualization support, a multi-key support, a multi-band support, and an enterprise key management server support. Storage transactions may be encrypted using the implemented encryption protocol.Type: ApplicationFiled: April 2, 2019Publication date: October 8, 2020Inventors: Chitrak Chitrak Gupta, Rama R. Bisa, Manjunath Vishwanath, Chandrashekar Nelogal
-
Publication number: 20190324514Abstract: An information handling system includes first and second power supplies, and a management controller. The power supplies are configured to operate in a first power mode to supply power to the information handling system and in a second power mode to shut down from supplying power to the information handling system. The management controller is configured in a normal operation mode to set the first power supply to the first power mode and set the second power supply in the second power mode. The management controller is configured in a test operation mode to set the second power supply to the first power mode, to set the first power supply to the second power mode, to determine whether the second power supply is operating within a first limit, and when the second power supply is not operating within the first limit, to provide a first indication that the second power supply is failing.Type: ApplicationFiled: April 23, 2018Publication date: October 24, 2019Inventors: Santosh Kumar Sahu, Rama R. Bisa, Sunil Lingappa, Ajaya K. Senapati, Vaideeswaran Ganesan
-
Patent number: 10355861Abstract: Cryptographic affinities are generated to improve security in data centers. When a blade server is hot swapped, the cryptographic affinities protect electronic data stored within the blade server. The cryptographic affinities are generated based on hashing a unique chassis identifier. If the blade server is installed in a different chassis, the cryptographic affinities lock out the different chassis from read, write, and other access operations. The cryptographic affinities may even require deleting or reformatting before rekeying is commenced.Type: GrantFiled: March 28, 2017Date of Patent: July 16, 2019Assignee: Dell Products, LPInventors: Sushma Basavarajaiah, Rama R. Bisa, Chitrak Gupta, Mukund P. Khatri
-
Patent number: 10241879Abstract: Debugging operations may utilize a dedicated debug port associated with a baseboard management controller. The baseboard management controller executes software programming that eliminates any need for a debugging cable. The baseboard management controller also permits debugging between virtual machines.Type: GrantFiled: April 28, 2017Date of Patent: March 26, 2019Assignee: DELL PRODUCTS, LPInventors: Chandrasekhar Puthillathe, Rama R. Bisa, Rajeshkumar I. Patel
-
Publication number: 20180314611Abstract: Debugging operations may utilize a dedicated debug port associated with a baseboard management controller. The baseboard management controller executes software programming that eliminates any need for a debugging cable. The baseboard management controller also permits debugging between virtual machines.Type: ApplicationFiled: April 28, 2017Publication date: November 1, 2018Inventors: Chandrasekhar Puthillathe, Rama R. Bisa, Rajeshkumar I. Patel
-
Publication number: 20180287791Abstract: Cryptographic affinities are generated to improve security in data centers. When a blade server is hot swapped, the cryptographic affinities protect electronic data stored within the blade server. The cryptographic affinities are generated based on hashing a unique chassis identifier. If the blade server is installed in a different chassis, the cryptographic affinities lock out the different chassis from read, write, and other access operations. The cryptographic affinities may even require deleting or reformatting before rekeying is commenced.Type: ApplicationFiled: March 28, 2017Publication date: October 4, 2018Inventors: Sushma Basavarajaiah, Rama R. Bisa, Chitrak Gupta, Mukund P. Khatri
-
Publication number: 20160371107Abstract: An information handling system includes a processor to run a hypervisor and a management controller coupled to the hypervisor. The management controller includes a virtual Universal Serial Bus (USB) hub, and the hypervisor launches a virtual machine on the processor. In response to an indication from the hypervisor that the virtual machine has been launched, the management controller instantiates a USB virtual NIC coupled to the virtual USB hub, and provides an address of the USB virtual NIC to the hypervisor. The hypervisor provides the address to the virtual machine. The virtual machine provides information to the management controller via the USB virtual NIC.Type: ApplicationFiled: June 18, 2015Publication date: December 22, 2016Inventors: Chandrasekhar Puthillathe, Rama R. Bisa