Patents by Inventor Rohith K. Ashok

Rohith K. Ashok has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140372497
    Abstract: A method, system and computer program product for managing hardware components in a cloud computing environment. Each hardware component in a data center of the cloud computing environment detects and identifies other hardware components within a communication range of the hardware component using a wireless protocol. Furthermore, each hardware component determines its actual location as well as its relative location with respect to the detected hardware components, such as based on a triangulation of the wireless signals. Such information is transmitted to an administrative server. An inventory of the hardware components in the data center, including their current location, is then compiled by the administrative server. In this manner, a hardware component can be more easily located after being relocated in the data center. Furthermore, the administrative server will be able to balance a workload across these hardware components based on their location.
    Type: Application
    Filed: June 17, 2013
    Publication date: December 18, 2014
    Inventors: Rohith K. Ashok, Roy F. Brabson, Hugh E. Hockett, Matt R. Hogstrom
  • Publication number: 20140372595
    Abstract: A method, system and computer program product for managing hardware components in a cloud computing environment. Each hardware component in a data center of the cloud computing environment detects and identifies other hardware components within a communication range of the hardware component using a wireless protocol. Furthermore, each hardware component determines its actual location as well as its relative location with respect to the detected hardware components, such as based on a triangulation of the wireless signals. Such information is transmitted to an administrative server. An inventory of the hardware components in the data center, including their current location, is then compiled by the administrative server. In this manner, a hardware component can be more easily located after being relocated in the data center. Furthermore, the administrative server will be able to balance a workload across these hardware components based on their location.
    Type: Application
    Filed: June 18, 2013
    Publication date: December 18, 2014
    Inventors: Rohith K. Ashok, Roy F. Brabson, Hugh E. Hockett, Matt R. Hogstrom
  • Publication number: 20140304437
    Abstract: A method and technique for allocation and balancing of storage resources includes: determining, for each of a plurality of storage controllers, an input/output (I/O) latency value based on an I/O latency associated with each storage volume controlled by a respective storage controller; determining network bandwidth utilization and network latency values corresponding to each storage controller; responsive to receiving a request to allocate a new storage volume, selecting a storage controller having a desired I/O latency value; determining whether the network bandwidth utilization and network latency values for the selected storage controller are below respective network bandwidth utilization and network latency value thresholds; and responsive to determining that the network bandwidth utilization and network latency values for the selected storage controller are below the respective thresholds, allocating the new storage volume to the selected storage controller.
    Type: Application
    Filed: June 20, 2014
    Publication date: October 9, 2014
    Inventors: Rohith K. Ashok, Roy F. Brabson, Wei L. Chan
  • Publication number: 20140298489
    Abstract: A method, data storage device and computer program product for having multiple users share a single data storage device securely. A data storage device, such as a Universal Serial Bus (USB) key, is plugged into a computing device. A USB controller of the USB key recognizes the computing device and creates an account for the user. The created account is associated with the user as well as associated with the computing device. Data uploaded to the USB key by the user is then associated with the created account. Only that user will be able to view that data on his/her computing device (computing device associated with the created account) unless the user indicates to share that data with other users. Such a process may be repeated each time the USB key is plugged into a different computing device thereby creating multiple accounts associated with multiple computing devices and users.
    Type: Application
    Filed: April 1, 2013
    Publication date: October 2, 2014
    Applicant: International Business Machines Corporation
    Inventors: Rohith K. Ashok, Roy F. Brabson, Hugh E. Hockett, Andrew R. Low
  • Publication number: 20140298487
    Abstract: A method, data storage device and computer program product for having multiple users share a single data storage device securely. A data storage device, such as a Universal Serial Bus (USB) key, is plugged into a computing device. A USB controller of the USB key recognizes the computing device and creates an account for the user. The created account is associated with the user as well as associated with the computing device. Data uploaded to the USB key by the user is then associated with the created account. Only that user will be able to view that data on his/her computing device (computing device associated with the created account) unless the user indicates to share that data with other users. Such a process may be repeated each time the USB key is plugged into a different computing device thereby creating multiple accounts associated with multiple computing devices and users.
    Type: Application
    Filed: March 29, 2013
    Publication date: October 2, 2014
    Applicant: International Business Machines Corporation
    Inventors: Rohith K. Ashok, Roy F. Brabson, Hugh E. Hockett, Andrew R. Low
  • Publication number: 20140297894
    Abstract: A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys.
    Type: Application
    Filed: March 29, 2013
    Publication date: October 2, 2014
    Applicant: International Business Machines Corporation
    Inventors: Rohith K. Ashok, Michael J. Burr, Hugh E. Hockett, Michael S. Law, Matthew J. Sheard
  • Publication number: 20140297895
    Abstract: A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys.
    Type: Application
    Filed: April 1, 2013
    Publication date: October 2, 2014
    Inventors: Rohith K. Ashok, Michael J. Burr, Hugh E. Hockett, Michael S. Law, Matthew J. Sheard
  • Publication number: 20140223241
    Abstract: A method, system and computer program product for intelligently responding to hardware failures so as to optimize system performance. An administrative server monitors the utilization of the hardware as well as the software components running on the hardware to assess a context of the software components running on the hardware. Upon detecting a hardware failure, the administrative server analyzes the hardware failure to determine the type of hardware failure and analyzes the properties of the workload running on the failed hardware. The administrative server then responds to the detected hardware failure based on various factors, including the type of the hardware failure, the properties of the workload running on the failed hardware and the context of the software running on the failed hardware. In this manner, by taking into consideration such factors in responding to the detected hardware failure, a more intelligent response is provided that optimizes system performance.
    Type: Application
    Filed: October 30, 2013
    Publication date: August 7, 2014
    Applicant: International Business Machines Corporation
    Inventors: Rohith K. Ashok, Roy F. Brabson, Barry P. Gower, Hugh E. Hockett
  • Publication number: 20140223443
    Abstract: A method, system and computer program product for determining a relative priority for a job. A “policy” is selected based on the job itself and the reason that the job is being executed, where the policy includes a priority range for the job and for an application. A priority for the job that is within the priority range of the job as established by the selected policy is determined based on environmental and context considerations. This job priority is then adjusted based on the priority of the application (within the priority range as established by the policy) becoming the job's final priority. By formulating a priority that more accurately reflects the true priority or importance of the job by taking into consideration the environmental and context considerations, job managers will now be able to process these jobs in a more efficient manner.
    Type: Application
    Filed: February 4, 2013
    Publication date: August 7, 2014
    Applicant: International Business Machines Corporation
    Inventors: Rohith K. Ashok, Roy F. Brabson, Michael J. Burr, Sivaram Gottimukkala, Hugh E. Hockett, Kristin R. Whetstone
  • Publication number: 20140223222
    Abstract: A method, system and computer program product for intelligently responding to hardware failures so as to optimize system performance. An administrative server monitors the utilization of the hardware as well as the software components running on the hardware to assess a context of the software components running on the hardware. Upon detecting a hardware failure, the administrative server analyzes the hardware failure to determine the type of hardware failure and analyzes the properties of the workload running on the failed hardware. The administrative server then responds to the detected hardware failure based on various factors, including the type of the hardware failure, the properties of the workload running on the failed hardware and the context of the software running on the failed hardware. In this manner, by taking into consideration such factors in responding to the detected hardware failure, a more intelligent response is provided that optimizes system performance.
    Type: Application
    Filed: February 5, 2013
    Publication date: August 7, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith K. Ashok, Roy F. Brabson, Barry P. Gower, Hugh E. Hockett
  • Patent number: 8793372
    Abstract: A method and technique for allocation and balancing of storage resources includes: determining, for each of a plurality of storage controllers, an input/output (I/O) latency value based on an I/O latency associated with each storage volume controlled by a respective storage controller; determining network bandwidth utilization and network latency values corresponding to each storage controller; responsive to receiving a request to allocate a new storage volume, selecting a storage controller having a desired I/O latency value; determining whether the network bandwidth utilization and network latency values for the selected storage controller are below respective network bandwidth utilization and network latency value thresholds; and responsive to determining that the network bandwidth utilization and network latency values for the selected storage controller are below the respective thresholds, allocating the new storage volume to the selected storage controller.
    Type: Grant
    Filed: February 12, 2013
    Date of Patent: July 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Rohith K. Ashok, Roy F. Brabson, Wei L. Chan
  • Patent number: 8788658
    Abstract: A system and technique for allocating and balancing storage resources includes: a plurality of storage controllers each controlling one or more storage volumes, and a processor unit operable to execute a management application to: determine, for each controller, an input/output (I/O) latency value based on an I/O latency associated with each storage volume controlled by a respective controller; determine network bandwidth utilization and network latency values corresponding to each controller; responsive to a request to allocate a new storage volume, select a controller having a desired I/O latency value; determine whether the network bandwidth utilization and network latency values for the selected controller are below respective network bandwidth utilization and network latency value thresholds; and responsive to determining that the network bandwidth utilization and network latency values for the selected controller are below respective thresholds, allocate the new storage volume to the selected controller
    Type: Grant
    Filed: February 3, 2012
    Date of Patent: July 22, 2014
    Assignee: International Business Machines Corporation
    Inventors: Rohith K. Ashok, Roy F. Brabson, Wei L. Chan
  • Publication number: 20140201365
    Abstract: A method, system and computer program product for optimizing quality of service settings for virtual machine deployment and migration. A first network (e.g., user network) is provided that is dedicated to running user workloads deployed on virtual machines. A second network (e.g., cloud management network), isolated from the first network, is also provided that is dedicated to virtual machine deployment and migration. As a result of the first and second networks not being shared, the administrative server utilizes unique quality of service settings for virtual machine deployment and migration supported by the second network that would otherwise not be possible if the first and second networks were shared.
    Type: Application
    Filed: January 15, 2013
    Publication date: July 17, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith K. Ashok, Roy F. Brabson, Lap T. Huynh, Michael S. Law, Mickael Maison, Matthew J. Sheard
  • Publication number: 20140157038
    Abstract: A method, system and computer program product for reducing the failure of processes. After a job is received, a determination is made as whether the received job is a “short-lived job” or a “long-lived job.” A short-lived job refers to a job who accomplishes a given task in less than a threshold period of time. A long-lived job refers to a job who accomplishes a given task in greater than a threshold period of time. For an identified long-lived job, the long-lived job is executed on a single process apart from other processes; whereas, the short-lived job is executed on at least one process separate from the processes executing long-lived jobs. As a result of executing the long-lived jobs on separate processes from the short-lived jobs, the likelihood of having a process fail is lessened since the duration of time that the process is running will be lessened.
    Type: Application
    Filed: December 4, 2012
    Publication date: June 5, 2014
    Applicant: International Business Machines Corporation
    Inventors: Rohith K. Ashok, Roy F. Brabson, Michael J. Burr, Hugh E. Hockett, Kristin R. Whetstone
  • Publication number: 20140149421
    Abstract: A method, system and computer program product for dynamically quantifying a demand for the software components deployed in a cloud environment. An administrative server generates a table mapping the software levels of the software components of the deployed software stacks with the number of instances of the deployed software stacks tracked over a period of time. The depth weight based on subtracting a depth index (zero-based) from a depth size is calculated for each software component, where a depth index refers to the software level of the software component in question and a depth size refers to the number of software levels for the software stack bearing the software component in question. A metric used in quantifying the demand for the software component (“popularity index”) is then determined for each software component based on the number of deployed instances and the depth weight for that software component.
    Type: Application
    Filed: November 27, 2012
    Publication date: May 29, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith K. Ashok, Steven D. Ims, James K. Kochuba, Aaron J. Quirk
  • Publication number: 20140068600
    Abstract: A method, system and computer program product for providing a seamless transition for resizing virtual machines from a development environment to a production environment. An administrative server receives an instruction from a customer to resize a virtual machine running on a cloud computing node, where the resized virtual machine requires physical resources (e.g., twenty physical processor cores) to be utilized in the production environment. Instead of the administrative server utilizing the same number of physical resources in the development environment that need to be utilized in the production environment, the administrative server utilizes a fewer number of physical resources by also utilizing virtual resources (e.g.
    Type: Application
    Filed: August 29, 2012
    Publication date: March 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith K. Ashok, Roy F. Brabson, Hugh E. Hockett, Jose Ortiz
  • Publication number: 20140059542
    Abstract: A method, system and computer program product for optimizing virtual machine deployment time. A cloud controller receives a request from a user to configure a virtual machine with a designated CPU capacity. If the designated CPU capacity is less than or equal to a threshold, then the cloud controller determines if there are additional cloud resources available to be allocated to deploy the virtual machine. If so, then the cloud controller allocates additional CPU capacity to the designated CPU capacity to be used to provision the virtual machine thereby enabling a multithreaded startup to initialize the operating system and middleware tiers so as to reduce the deployment time of the virtual machine. The additional resources would only be available during the initial deployment time of the virtual machine and removed before the user is granted access to the system when it comes online.
    Type: Application
    Filed: August 27, 2012
    Publication date: February 27, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith K. Ashok, Douglas A. Larson, Aaron J. Quirk
  • Publication number: 20140052945
    Abstract: A method, system and computer program product for optimizing storage system behavior in a cloud computing environment. An Input/Output (I/O) operation data is appended with a tag, where the tag indicates a class of data for the I/O operation data. Upon the storage controller reviewing the tag appended to the I/O operation data, the storage controller performs a table look-up for the storage policy associated with the determined class of data. The storage controller applies a map to determine a storage location for the I/O operation data in a drive device, where the map represents a logical volume which indicates a range of block data that is to be excluded for being stored on the drive device and a range of block data that is to be considered for being stored on the drive device. In this manner, granularity of storage policies is provided in a cloud computing environment.
    Type: Application
    Filed: August 14, 2012
    Publication date: February 20, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith K. Ashok, Darryl E. Gardner, Ivan M. Heninger, Douglas A. Larson, Gerald F. McBrearty, Aaron J. Quirk, Matthew J. Sheard
  • Publication number: 20140007124
    Abstract: Automated techniques ensure that system central processing unit (“CPU”) power is not a bottleneck when migrating logical partitions from one system to another system or systems (e.g., in the event of a system evacuation). CPU resources needed to fully drive available bandwidth during the migration are computed. CPU resources of the system are then adjusted for the migration, which may comprise scaling down the CPU resources that are guaranteed for the executing partitions and/or adjusting relative partition variable weights to limit the amount of excess capacity that can be allocated to a partition.
    Type: Application
    Filed: June 27, 2012
    Publication date: January 2, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith K. Ashok, Agustin Mena, III, Thuy B. Nguyen, Bret R. Olszewski
  • Publication number: 20140006741
    Abstract: Automated techniques ensure that system central processing unit (“CPU”) power is not a bottleneck when migrating logical partitions from one system to another system or systems (e.g., in the event of a system evacuation). CPU resources needed to fully drive available bandwidth during the migration are computed. CPU resources of the system are then adjusted for the migration, which may comprise scaling down the CPU resources that are guaranteed for the executing partitions and/or adjusting relative partition variable weights to limit the amount of excess capacity that can be allocated to a partition.
    Type: Application
    Filed: February 14, 2013
    Publication date: January 2, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohith K. Ashok, Agustin Mena, III, Thuy B. Nguyen, Bret R. Olszewski