Patents by Inventor RAUNAK RAVINDRA SINGWI

RAUNAK RAVINDRA SINGWI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11968096
    Abstract: Computer-implemented methods, media, and systems for inter-cluster automated failover and migration of containerized workloads across edges devices are disclosed. One example method includes monitoring telemetry data received from a first software defined wide area network (SD-WAN) edge device that has a workload scheduled, where the telemetry data includes at least one of a health status of the workload or multiple runtime context elements at the first SD-WAN edge device. It is determined that a failure associated with either the first SD-WAN edge device or the workload occurs. A mode of the failure is determined. A remediation process based on the determined mode of the failure and a current state of the workload is performed.
    Type: Grant
    Filed: September 14, 2022
    Date of Patent: April 23, 2024
    Assignee: VMware, Inc.
    Inventors: Raunak Ravindra Singwi, Daniel Beveridge, Erol Aygar, Nilanjan Daw, Sairam Veeraswamy
  • Patent number: 11962635
    Abstract: Disclosed herein are systems and methods for dynamically switching between synchronous and asynchronous communication channels. A communication request can be received from an application, and a request identifier can be generated for the communication request. The communication request can be transmitted to an edge server application via a first communication channel. The first communication channel can be selected from a plurality of communication channels based at least in part on a policy. In an instance in which a condition specified by the policy is detected in the transmission of the communication request, a second communication channel can be selected from the plurality of communication channels. The communication request can be transmitted to the edge server application using the second communication channel.
    Type: Grant
    Filed: November 28, 2022
    Date of Patent: April 16, 2024
    Assignee: VMware, Inc.
    Inventors: Raunak Ravindra Singwi, Akeem Lamar Jenkins, Marc Wayne Brotherson, Shivali Sharma, Sean James Huntley
  • Publication number: 20240048451
    Abstract: Computer-implemented methods, media, and systems for context-sensitive defragmentation and aggregation of containerized workloads running on edge devices are disclosed. One example method includes monitoring telemetry data from multiple software defined wide area network (SD-WAN) edge devices that run multiple workloads, where the telemetry data includes at least one of resource utilization at the multiple SD-WAN edge devices, inter-workload trigger dependency, or inter-workload data dependency among the multiple workloads. It is determined, based on the telemetry data, that at least two of the multiple workloads running on at least two SD-WAN edge devices have the inter-workload trigger dependency or the inter-workload data dependency.
    Type: Application
    Filed: August 15, 2023
    Publication date: February 8, 2024
    Inventors: NILANJAN DAW, Sairam Veeraswamy, Raunak Ravindra Singwi, Erol Aygar
  • Publication number: 20240048459
    Abstract: Computer-implemented methods, media, and systems for remediation of containerized workloads based on context breach at edge devices are disclosed. One example computer-implemented method includes monitoring telemetry data from a first software defined wide area network (SD-WAN) edge device, where the telemetry data includes multiple context elements at the first SD-WAN edge device. It is determined that a context change occurs for at least one of the context elements at the first SD-WAN edge device. It is determined that due to the context change, the first SD-WAN edge device does not satisfy one or more requirements for running one or more workloads scheduled to run. In response to the determination that the first SD-WAN edge device does not satisfy the one or more requirements, the at least one of the one or more workloads is offloaded from the first SD-WAN edge device to a second SD-WAN edge device.
    Type: Application
    Filed: October 17, 2023
    Publication date: February 8, 2024
    Inventors: Raunak Ravindra Singwi, Daniel Beveridge, Erol Aygar, Sairam Veeraswamy
  • Publication number: 20240039806
    Abstract: Computer-implemented methods, media, and systems for inter-cluster automated failover and migration of containerized workloads across edges devices are disclosed. One example method includes monitoring telemetry data received from a first software defined wide area network (SD-WAN) edge device that has a workload scheduled, where the telemetry data includes at least one of a health status of the workload or multiple runtime context elements at the first SD-WAN edge device. It is determined that a failure associated with either the first SD-WAN edge device or the workload occurs. A mode of the failure is determined. A remediation process based on the determined mode of the failure and a current state of the workload is performed.
    Type: Application
    Filed: September 14, 2022
    Publication date: February 1, 2024
    Inventors: RAUNAK RAVINDRA SINGWI, Daniel Beveridge, Erol Aygar, Nilanjan Daw, Sairam Veeraswamy
  • Publication number: 20240039809
    Abstract: Computer-implemented methods, media, and systems for right-sizing containerized workloads running on edge devices are disclosed. One example method includes receiving a manifest file including one or more runtime service level agreement (SLA) requirements and one or more upper bounds on resource allocation for running the workload on a software defined wide area network (SD-WAN) edge device. The workload on the SD-WAN edge device is started based on the manifest file. Telemetry data from the SD-WAN edge device is monitored, where the telemetry data includes resource usage data for running the workload on the SD-WAN edge device. A model for resource usage behavior of the workload running on the SD-WAN edge device is established based on the monitored telemetry data. One or more updated upper bounds on resource allocation for running the workload on the SD-WAN edge device are displayed based on the established model.
    Type: Application
    Filed: September 14, 2022
    Publication date: February 1, 2024
    Inventors: EROL AYGAR, Nilanjan Daw, Raunak Ravindra Singwi
  • Publication number: 20240039804
    Abstract: Computer-implemented methods, media, and systems for automating secured deployment of containerized workloads on edge devices are disclosed. One example computer-implemented method includes receiving, by a software defined wide area network (SD-WAN) edge device and from a remote manager, resource quotas for a compute service to be enabled at the SD-WAN edge device. Pre-deployment sanity checks are performed by confirming availability of resources satisfying the resource quotas, where the resources are at the SD-WAN edge device. In response to the confirmation of the availability of resources satisfying the resource quotas, one or more security constructs are set up to isolate SD-WAN network functions at the SD-WAN edge device from the compute service at the SD-WAN edge device. The compute service is attached to a SD-WAN network by the SD-WAN edge device. An acknowledgement that the compute service is enabled at the SD-WAN edge device is sent to the remote manager.
    Type: Application
    Filed: September 14, 2022
    Publication date: February 1, 2024
    Inventors: EROL AYGAR, MARGARET NATASHA DREW, MARK PEEK, DANIEL BEVERIDGE, RAUNAK RAVINDRA SINGWI, NILANJAN DAW, PRANAY PAREEK, SAIRAM VEERASWAMY, AMARNATH RAGHUNATHAN
  • Publication number: 20240039808
    Abstract: Computer-implemented methods, media, and systems for context based meta scheduling of containerized workloads across edge devices are disclosed. One example computer-implemented method includes receiving a manifest file that includes multiple context requirements of a workload, where the multiple context requirements include multiple runtime service level agreement (SLA) requirements of the workload. Telemetry data is received from multiple software defined wide area network (SD-WAN) edge devices, where the telemetry data includes respective context data of each of the multiple SD-WAN edge devices. A SD-WAN edge device is selected, based on the telemetry data and the multiple context requirements of the workload, from the multiple SD-WAN edge devices for placing the workload on the selected SD-WAN edge device, where the context data of the selected SD-WAN edge device meets the multiple context requirements of the workload. The workload is run on the selected SD-WAN edge device.
    Type: Application
    Filed: September 15, 2022
    Publication date: February 1, 2024
    Inventors: RAUNAK RAVINDRA SINGWI, EROL AYGAR, DANIEL BEVERIDGE, MARK PEEK, NILANJAN DAW, SAIRAM VEERASWAMY, PRANAY PAREEK
  • Patent number: 11792086
    Abstract: Computer-implemented methods, media, and systems for remediation of containerized workloads based on context breach at edge devices are disclosed. One example computer-implemented method includes monitoring telemetry data from a first software defined wide area network (SD-WAN) edge device, where the telemetry data includes multiple context elements at the first SD-WAN edge device. It is determined that a context change occurs for at least one of the context elements at the first SD-WAN edge device. It is determined that due to the context change, the first SD-WAN edge device does not satisfy one or more requirements for running one or more workloads scheduled to run. In response to the determination that the first SD-WAN edge device does not satisfy the one or more requirements, the at least one of the one or more workloads is offloaded from the first SD-WAN edge device to a second SD-WAN edge device.
    Type: Grant
    Filed: September 15, 2022
    Date of Patent: October 17, 2023
    Assignee: VMware, Inc.
    Inventors: Raunak Ravindra Singwi, Daniel Beveridge, Erol Aygar, Sairam Veeraswamy
  • Publication number: 20230297687
    Abstract: A method for assigning permissions to files in a malware detection system, is provided. The method generally includes assigning a first subset of permissions to a first file classified as an unknown file, opening the first file in accordance with the first subset of permissions, determining a first verdict for the first file, the first verdict indicating the first file is benign, assigning a second subset of permissions to the first file based on determining the first verdict indicating the first file is benign, and executing the first file in accordance with the second subset of permissions.
    Type: Application
    Filed: March 21, 2022
    Publication date: September 21, 2023
    Inventors: Shivali SHARMA, Raunak Ravindra SINGWI, Kedar Bhalchandra CHAUDHARI, Akeem Lamar JENKINS
  • Patent number: 11729062
    Abstract: Computer-implemented methods, media, and systems for context-sensitive defragmentation and aggregation of containerized workloads running on edge devices are disclosed. One example method includes monitoring telemetry data from multiple software defined wide area network (SD-WAN) edge devices that run multiple workloads, where the telemetry data includes at least one of resource utilization at the multiple SD-WAN edge devices, inter-workload trigger dependency, or inter-workload data dependency among the multiple workloads. It is determined, based on the telemetry data, that at least two of the multiple workloads running on at least two SD-WAN edge devices have the inter-workload trigger dependency or the inter-workload data dependency.
    Type: Grant
    Filed: September 14, 2022
    Date of Patent: August 15, 2023
    Assignee: VMware, Inc.
    Inventors: Nilanjan Daw, Sairam Veeraswamy, Raunak Ravindra Singwi, Erol Aygar
  • Publication number: 20230216939
    Abstract: Disclosed herein are systems and methods for dynamically switching between synchronous and asynchronous communication channels. A communication request can be received from an application, and a request identifier can be generated for the communication request. The communication request can be transmitted to an edge server application via a first communication channel. The first communication channel can be selected from a plurality of communication channels based at least in part on a policy. In an instance in which a condition specified by the policy is detected in the transmission of the communication request, a second communication channel can be selected from the plurality of communication channels. The communication request can be transmitted to the edge server application using the second communication channel.
    Type: Application
    Filed: November 28, 2022
    Publication date: July 6, 2023
    Inventors: RAUNAK RAVINDRA SINGWI, Akeem Lamar Jenkins, Marc Wayne Brotherson, Shivali Sharma, Sean James Huntley
  • Patent number: 11516276
    Abstract: Disclosed herein are systems and methods for dynamically switching between synchronous and asynchronous communication channels. A communication request can be received from an application, and a request identifier can be generated for the communication request. The communication request can be transmitted to an edge server application via a first communication channel. The first communication channel can be selected from a plurality of communication channels based at least in part on a policy. In an instance in which a condition specified by the policy is detected in the transmission of the communication request, a second communication channel can be selected from the plurality of communication channels. The communication request can be transmitted to the edge server application using the second communication channel.
    Type: Grant
    Filed: February 22, 2022
    Date of Patent: November 29, 2022
    Assignee: VMware, Inc.
    Inventors: Raunak Ravindra Singwi, Akeem Lamar Jenkins, Marc Wayne Brotherson, Shivali Sharma, Sean James Huntley
  • Patent number: 11038926
    Abstract: In one example, a cloud computing environment may be probed to detect an actual topology including connectivity between infrastructure security nodes and management nodes. Each management node may execute a corresponding centralized management service. Each infrastructure security node may execute a corresponding infrastructure security service that handles at least one infrastructure security function. Further, a set of candidate topologies may be generated based on the actual topology. Each candidate topology may indicate a way to replicate the infrastructure security service into the management nodes. Furthermore, a replication partner associated with each of the management nodes may be determined based on a selection of one of the candidate topologies. An operation to deploy the infrastructure security service on the management nodes may be executed based on the selected one of the candidate topologies and the determined replication partners to form an embedded linked mode architecture.
    Type: Grant
    Filed: April 5, 2019
    Date of Patent: June 15, 2021
    Assignee: VMWARE, INC.
    Inventors: Dinesh Sharma, Ammar Rizvi, Akash Kodenkiri, Raunak Ravindra Singwi, Prabhavathi Guttalahunase Munikempegowda
  • Publication number: 20200236145
    Abstract: In one example, a cloud computing environment may be probed to detect an actual topology including connectivity between infrastructure security nodes and management nodes. Each management node may execute a corresponding centralized management service. Each infrastructure security node may execute a corresponding infrastructure security service that handles at least one infrastructure security function. Further, a set of candidate topologies may be generated based on the actual topology. Each candidate topology may indicate a way to replicate the infrastructure security service into the management nodes. Furthermore, a replication partner associated with each of the management nodes may be determined based on a selection of one of the candidate topologies. An operation to deploy the infrastructure security service on the management nodes may be executed based on the selected one of the candidate topologies and the determined replication partners to form an embedded linked mode architecture.
    Type: Application
    Filed: April 5, 2019
    Publication date: July 23, 2020
    Inventors: DINESH SHARMA, AMMAR RIZVI, AKASH KODENKIRI, RAUNAK RAVINDRA SINGWI, PRABHAVATHI GUTTALAHUNASE MUNIKEMPEGOWDA