Patents by Inventor Sambit Sahu

Sambit Sahu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8571918
    Abstract: A method of estimating a transit demand graph includes collecting conditional information that includes at least one condition that when satisfied converts at least one non-rider into a rider, generating a non-rider transit demand graph by satisfying one of the conditions, and generating a normalized transit demand graph from the non-rider transit demand graph and a rider transit demand graph. The riders use public transit and the non-riders do not use public transit. The non-rider transit demand graph shows the demand of the non-riders for a public transit route. The rider transit demand graph shows the demand of riders for the same public transit route.
    Type: Grant
    Filed: July 16, 2012
    Date of Patent: October 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Milind Naphade, Sambit Sahu
  • Patent number: 8572625
    Abstract: A system and method for determining application dependent components includes capturing interactions of an application stored in memory of a first environment with other components at runtime. The interactions are parsed and categorized to determine dependency information. The application is migrated to a new environment using the dependency information to reconfigure the application after migration without application-specific knowledge.
    Type: Grant
    Filed: August 4, 2009
    Date of Patent: October 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Hai Huang, Yaoping Ruan, Sambit Sahu, Anees A. Shaikh
  • Publication number: 20130262923
    Abstract: A method of deploying a software application on the Internet cloud that is failure-tolerant includes identifying those aspects of a software application that need to be persisted in the event of failure, and those aspects of the application that do not need to be persisted, and deploying the application where aspects that need to be persisted are deployed to persistent storage and aspects that aspects that do not need to be persisted are deployed ton non-persistent virtual partitions, where when a virtual partition or an application component fails, an instance of the application is recreatable from those application aspects that were deployed to persistent storage.
    Type: Application
    Filed: April 2, 2012
    Publication date: October 3, 2013
    Applicant: International Business Machines Corporation
    Inventors: Theophilus Benson, Yaoping Ruan, Sambit Sahu, Anees A. Shaikh
  • Publication number: 20130247135
    Abstract: In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
    Type: Application
    Filed: March 13, 2012
    Publication date: September 19, 2013
    Applicant: International Business Machines Corporation
    Inventors: Ashish Kundu, Ajay Mohindra, Sambit Sahu
  • Publication number: 20130222158
    Abstract: A system, method and program product for siting charging stations. A mobility detection module collects traffic data from vehicle sensors distributed in an area. A map matching module maps detected traffic in the area. A vehicle flow module temporally characterizes mapped traffic flow. An electric vehicle (EV) requirements (EVR) evaluator determines an optimal number of charging stations and respective locations for siting the charging stations.
    Type: Application
    Filed: February 23, 2012
    Publication date: August 29, 2013
    Inventors: Jing D. Dai, Ajay A. Deshpande, Younghun Kim, Ming Li, Pavankumar Murali, Sambit Sahu
  • Publication number: 20130205007
    Abstract: Embodiments of the present invention relate to an approach for suggesting/recommending migration of an IT environment to a cloud computing infrastructure. Specifically, in a typical embodiment, historical incident data of an information technology (IT) environment is analyzed. Based on the historical incident data, it may be determined whether a problem is recurring in the IT environment. If so, it may then be determined whether the problem can be mitigated in the cloud computing infrastructure. For example, it may be determined whether the cost of mitigating the problem by migrating to the cloud computing infrastructure is less than the cost of loss due to the problem within the current IT environment. A report particular to the IT environment that identifies a benefit of migrating the IT environment to the cloud computing infrastructure may be generated.
    Type: Application
    Filed: February 8, 2012
    Publication date: August 8, 2013
    Applicant: International Business Machines Corporation
    Inventors: Naga A. Ayachitula, Winnie Wing-Yee Cheng, James R. Moulic, Rajeev Puri, Sambit Sahu
  • Publication number: 20130191539
    Abstract: A method of securely deploying a software application in the Internet cloud including identifying those aspects of a software application that use secure data, and those aspects of the application that use non-secure data, deploying the secure data on one or more secure servers that are not publicly accessible over the Internet, and deploying non-secure data on one or more cloud servers that are publicly available over the Internet, where communication between the secure servers and the cloud servers is managed using secure connections with access only to computation results.
    Type: Application
    Filed: January 23, 2012
    Publication date: July 25, 2013
    Applicant: International Business Machines Corporation
    Inventors: Anca Sailer, Sambit Sahu, Hidayatullah Shaikh
  • Patent number: 8484639
    Abstract: A computer implemented method, a computer program product and a data processing system allocate resources within a computing organization. A hypervisor layer is implemented on an underlying hardware. The hypervisor layer comprises a set of virtual machines. A first pseudo-hypervisor layer is then implemented within a first one of the set of virtual machines of the hypervisor layer. The first pseudo-hypervisor layer comprises a second set of virtual machines. A first software component is located within a first virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer. A second software component is collocated within a second virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer.
    Type: Grant
    Filed: April 5, 2011
    Date of Patent: July 9, 2013
    Assignee: International Business Machines Corporation
    Inventors: Hai Huang, Yaoping Ruan, Sambit Sahu
  • Patent number: 8458284
    Abstract: A system for transferring a live application from a source to a target machines includes memory capture component that monitors and captures memory segments associated with one or more memories, one or more sets of these memory segments comprising one or more applications, the memory segments changing while the live application is in execution. A frequency ranking component organizes the memory segments in an order determined by memory segment change frequency. A link identification component identifies one or more connecting links to one or more sets of peer machines, each set of machines connecting said source machine to said target machine, the link identifier further determining the bandwidth associated with each connecting link. A routing component preferentially routes one or more of the memory segments over said connecting links based on said order.
    Type: Grant
    Filed: June 12, 2009
    Date of Patent: June 4, 2013
    Assignee: International Business Machines Corporation
    Inventors: Hai Huang, Yaoping Ruan, Sambit Sahu, Anees A. Shaikh, Kunwadee Sripanidkulchai, Sai Zeng
  • Publication number: 20130137450
    Abstract: A GPS-enabled cellular electronic device is operated in an indoor mode. An increase in strength of a cellular signal is detected at the GPS-enabled cellular electronic device. Responsive at least to the increase in cellular signal strength, the GPS-enabled cellular electronic device is transitioned to an outdoor testing mode. Detecting is carried out to determine whether movement of the GPS-enabled cellular electronic device occurs during the outdoor testing mode. If so, the GPS-enabled cellular electronic device is transitioned to an outdoor mode.
    Type: Application
    Filed: November 30, 2011
    Publication date: May 30, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jing Dai, Ming Li, Milind R. Naphade, Sambit Sahu
  • Publication number: 20130116939
    Abstract: A computer program product includes a tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for performing a method. The method includes, upon receiving utility consumption data of a group of elements, defining clusters of elements by like geography and like utility consumption, evaluating a significance of each cluster by comparing an average utility consumption within the cluster with utility consumption of elements neighboring the cluster and determining from a result of the evaluating which clusters exhibit significant differences in utility consumption from the neighboring elements and defining those clusters as regional outliers.
    Type: Application
    Filed: November 3, 2011
    Publication date: May 9, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jing D. Dai, Feng Chen, Milind R. Naphade, Sambit Sahu
  • Patent number: 8433906
    Abstract: A method and system for ensuring the authenticity of server returned information displayed at a client browser is provided. The method comprises receiving the server returned information at a client computer; storing a copy of the server returned information at the client computer; inspecting the server returned information for one or more locked objects; allowing the client browser to operate one or more client installed scripts; inspecting the server returned information for any modifications to the one or more locked objects; and in response to determining that the one or more client installed scripts have made modifications to the one or more locked objects, replacing the modified locked objects with unmodified versions of the locked objects from the stored copy of the server returned information.
    Type: Grant
    Filed: May 26, 2010
    Date of Patent: April 30, 2013
    Assignee: International Business Machines Corporation
    Inventors: Hani T. Jamjoom, Debanjan Saha, Sambit Sahu
  • Publication number: 20130103215
    Abstract: Utility meter readings generated at low sampling rates are disaggregated to identify consumer usage activities. Time intervals between readings can include a plurality of consumer usage activities. By employing a model which recognizes associations among consumer usage activities, effective disaggregation is possible using only aggregated consumption data and interval start times. Consumers and utility managers can design and assess conservation programs based on the disaggregated consumption usage activities.
    Type: Application
    Filed: August 17, 2012
    Publication date: April 25, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jing Dai, Feng Chen, Milind R. Naphade, Sambit Sahu
  • Patent number: 8412809
    Abstract: Method, apparatus and computer program product manage a plurality of networks with a single tenant network management tool using virtualization and implement control plane virtualization of the single tenant management tool; data storage virtualization of a data storage apparatus and network address virtualization of an available address range. A virtual machine may be implemented for each network of the plurality of networks to contain an instance of the single tenant management tool. In one implementation, a proxy is used to implement data storage virtualization. In another implementation, separate data storage is maintained for each network and data storage virtualization is achieved by managing the network protocol stack virtualization. The network address virtualization may be implemented using machine-level virtualization or operating-system-level virtualization.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: April 2, 2013
    Assignee: International Business Machines Corporation
    Inventors: Yaoping Ruan, Debanjan Saha, Sambit Sahu, Anees Shaikh, Chang-Hao Tsai
  • Publication number: 20130061224
    Abstract: A computer implemented method of virtual machine migration with filtered network connectivity includes enforcing network security and routing at a hypervisor layer which is independent of guest operating systems via dynamic updating of routing controls initiated by a migration of said virtual machine from a first device to a second device.
    Type: Application
    Filed: August 22, 2012
    Publication date: March 7, 2013
    Applicant: International Business Machines Corporation
    Inventors: John Reumann, Debanjan Saha, Sambit Sahu, Dinesh Chandra Verma
  • Patent number: 8381209
    Abstract: A method (and system) which provides virtual machine migration with filtered network connectivity and control of network security of a virtual machine by enforcing network security and routing at a hypervisor layer at which the virtual machine partition is executed, and which is independent of guest operating systems.
    Type: Grant
    Filed: January 3, 2007
    Date of Patent: February 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: John Reumann, Debanjan Saha, Sambit Sahu, Dinesh Chandra Verma
  • Patent number: 8380861
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.
    Type: Grant
    Filed: February 3, 2011
    Date of Patent: February 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
  • Publication number: 20130024573
    Abstract: Data representative of a set of requests for cloud computing services is obtained. The services are to be provided by a cloud having a plurality of base images. The requests specify requested subsets of the base images. Data representative of provisioning and de-provisioning costs associated with the plurality of base images is obtained. Then, k composite virtual appliances are pre-provisioned. The composite virtual appliances include virtual appliance subsets of the base images, based on cost minimization, in accordance with the data representative of the set of requests and the data representative of the provisioning and de-provisioning costs.
    Type: Application
    Filed: July 18, 2011
    Publication date: January 24, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Takayuki Kushida, Rajeev Puri, Sambit Sahu, Upendra Sharma
  • Publication number: 20130007268
    Abstract: Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics.
    Type: Application
    Filed: September 10, 2012
    Publication date: January 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gerd Breiter, Sambit Sahu, Anca Sailer, Hidayatullah Shaikh, Mahesh Viswanathan
  • Publication number: 20120324116
    Abstract: A service-level specification for information technology services is obtained from a user. The service-level specification is mapped into an information technology specific deployment plan. Information technology specific resources are deployed in accordance with the information technology specific deployment plan to provide the information technology services.
    Type: Application
    Filed: August 31, 2012
    Publication date: December 20, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chitra Dorai, Raymond B. Jennings, III, Sambit Sahu, Anees A. Shaikh