Patents by Inventor Sandeep M

Sandeep M has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130006943
    Abstract: Embodiments of the present invention provide a hybrid (e.g., local and remote) approach for data backup in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of storage configuration parameters corresponding to a set of data to be backed up is received and stored in a computer data structure. The set of storage configuration parameters can comprise at least one of the following: a recovery time objective (RTO), a recovery point objective (RPO), and a desired type of protection for the set of data. Regardless, the set of data is compared to previously stored data to identify at least one of the following: portions of the set of data that have commonality with the previously stored data; and portions of the set of data that are unique to the set of data (i.e., not in common with any of the previously stored data). The above-described process is referred to herein as “de-duplication”.
    Type: Application
    Filed: June 30, 2011
    Publication date: January 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kavita Chavda, Nagapramod S. Mandagere, Sandeep M. Uttamchandani, Pin Zhou
  • Publication number: 20120330895
    Abstract: Embodiments of the present invention provide an approach for providing non-disruptive transitioning of application replication configurations and proactive analysis of possible error scenarios. Specifically, under embodiments of the present invention, a common integration model (CIM)-compatible representation of a system replication plan is provided in a computer data structure. Based on the representation, a hierarchical tree data structure having a set of nodes is created. A set of system configuration updates pertaining to the set of nodes are then classified (e.g., based upon the type of configuration update). Once the set of nodes has been classified, the set of nodes may then be analyzed to determine if any nodes of the set are isomorphic. If so, the plan can be modified accordingly. In any event, the replication plan (or modified replication plan) may then be implemented.
    Type: Application
    Filed: June 24, 2011
    Publication date: December 27, 2012
    Applicant: International Business Machines Corporation
    Inventors: Kavita Chavda, Nagapramod S. Mandagere, Sandeep M. Uttamchandani, Pin Zhou
  • Patent number: 8326669
    Abstract: Disclosed is a storage management framework that integrates corrective action plans output from multiple different types of planning tools, sorts the different corrective action plans based on utility and risk values and outputs a time-based schedule for implementing one or more of the corrective action plans to resolve identified current and anticipated workload service level objective (SLO) violations.
    Type: Grant
    Filed: April 19, 2007
    Date of Patent: December 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: Madhukar R. Korupolu, Sandeep M. Uttamchandani, Kaladhar Voruganti, Li Yin
  • Publication number: 20120304182
    Abstract: A system and associated method for continuously optimizing data archive management scheduling. A job scheduler receives, from an archive management system, inputs of task information, replica placement data, infrastructure topology data, and resource performance data. The job scheduler models a flow network that represents data content, software programs, physical devices, and communication capacity of the archive management system in various levels of vertices according to the received inputs. An optimal path in the modeled flow network is computed as an initial schedule, and the archive management system performs tasks according to the initial schedule. The operations of scheduled tasks are monitored and the job scheduler produces a new schedule based on feedbacks of the monitored operations and predefined heuristics.
    Type: Application
    Filed: August 8, 2012
    Publication date: November 29, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Brian Cho, Kavita Chavda, Mickey Iqbal, Seshashayee S. Murthy, Sandeep M. Uttamchandani, Pin Zhou
  • Patent number: 8315991
    Abstract: Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change.
    Type: Grant
    Filed: April 20, 2010
    Date of Patent: November 20, 2012
    Assignee: International Business Machines Corporation
    Inventors: Nagapramod S. Mandagere, Mark J. Seaman, Sandeep M. Uttamchandani
  • Publication number: 20120271678
    Abstract: Minimizing cost chargeback in an information technology (IT) computing environment including multiple resources. One implementation involves determining time-based usage patterns and allocation statistics for a plurality of resources and associated resource workloads. Using a regression function for determining a correlation of response time with resource usages and outstanding input/output instructions for the plurality of resources. Based on the time-based usage patterns, allocation statistics and the correlation, deriving an interpolation using positive and negative integrals to minimize a difference between allocated resource values and average allocation values. Determining service level objectives (SLOs) and resource allocation for minimizing cost chargeback for the resource workloads based on the derived interpolation.
    Type: Application
    Filed: July 3, 2012
    Publication date: October 25, 2012
    Applicant: International Business Machines Corporation
    Inventors: Sandip Agarwala, Ramani R. Routray, Sandeep M. Uttamchandani
  • Patent number: 8276148
    Abstract: A system and associated method for continuously optimizing data archive management scheduling. A job scheduler receives, from an archive management system, inputs of task information, replica placement data, infrastructure topology data, and resource performance data. The job scheduler models a flow network that represents data content, software programs, physical devices, and communication capacity of the archive management system in various levels of vertices according to the received inputs. An optimal path in the modeled flow network is computed as an initial schedule, and the archive management system performs tasks according to the initial schedule. The operations of scheduled tasks are monitored and the job scheduler produces a new schedule based on feedbacks of the monitored operations and predefined heuristics.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: September 25, 2012
    Assignee: International Business Machines Corporation
    Inventors: Brian Cho, Kavita Chavda, Mickey Iqbal, Seshashayee S. Murthy, Sandeep M. Uttamchandani, Pin Zhou
  • Patent number: 8266280
    Abstract: A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer.
    Type: Grant
    Filed: March 17, 2010
    Date of Patent: September 11, 2012
    Assignee: International Business Machines Corporation
    Inventors: Seshashayee S. Murthy, Ramani R. Routray, Sandeep M. Uttamchandani
  • Patent number: 8260622
    Abstract: The embodiments of the invention provide methods, computer program products, etc. for complaint-based service level objectives. More specifically, a method of deducing undefined service level objectives receives complaints regarding behavior of a system. The complaints could include a severity parameter, an entity parameter, a nature-of-complaint parameter, a timestamp parameter, and/or an identification parameter. Next, system details representing a current state of the system are recorded for each of the complaints. The method then automatically analyzes a history of the system details and the complaints to produce a historical compilation of the system details. The analyzing can include weighing each of the system details by a severity parameter value.
    Type: Grant
    Filed: February 13, 2007
    Date of Patent: September 4, 2012
    Assignees: International Business Machines Corporation, National Security Agency
    Inventors: Edward G. Chron, David A. Pease, Elizabeth S. Richards, Sandeep M. Uttamchandani
  • Publication number: 20120221745
    Abstract: A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer.
    Type: Application
    Filed: May 9, 2012
    Publication date: August 30, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seshashayee S. MURTHY, Ramani R. ROUTRAY, Sandeep M. UTTAMCHANDANI
  • Patent number: 8250582
    Abstract: Reducing cost chargeback in an information technology (IT) computing environment including multiple resources, is provided. One implementation involves a process wherein resource usage and allocation statistics are stored for a multitude of resources and associated cost policies. Then, time-based usage patterns are determined for the resources from the statistics. A correlation of response time with resource usages and outstanding input/output instructions for the resources is determined. Based on usage patterns and the correlation, a multitude of potential cost reduction recommendations are determined. Further, a multitude of integrals are obtained based on the potential cost reduction recommendations, and a statistical integral is obtained based on the statistics. A difference between the statistical integral and each of the multiple integrals is obtained and compared with a threshold to determine potential final cost reduction recommendations.
    Type: Grant
    Filed: September 25, 2009
    Date of Patent: August 21, 2012
    Assignee: International Business Machines Corporation
    Inventors: Sandip Agarwala, Ramani R. Routray, Sandeep M. Uttamchandani
  • Publication number: 20120116743
    Abstract: Embodiments of the present invention provide an approach for adapting an information extraction middleware for a clustered computing environment (e.g., a cloud environment) by creating and managing a set of statistical models generated from performance statistics of operating devices within the clustered computing environment. This approach takes into account the required accuracy in modeling, including computation cost of modeling, to pick the best modeling solution at a given point in time. When higher accuracy is desired (e.g., nearing workload saturation), the approach adapts to use an appropriate modeling algorithm. Adapting statistical models to the data characteristics ensures optimal accuracy with minimal computation time and resources for modeling. This approach provides intelligent selective refinement of models using accuracy-based and operating probability-based triggers to optimize the clustered computing environment, i.e., maximize accuracy and minimize computation time.
    Type: Application
    Filed: November 8, 2010
    Publication date: May 10, 2012
    Applicant: International Business Machines Corporation
    Inventors: Richard Ayala, Kavita Chavda, Sandeep Gopisetty, Seshashayee S. Murthy, Aameek Singh, Sandeep M. Uttamchandani
  • Publication number: 20120109907
    Abstract: Embodiments of the invention relate to performing on-demand data deduplication for managing data and storage space. Redundant data in a system is detected. Availability of data storage space in the system is periodically evaluated. Performance parameters of the system are evaluated. Detected redundant data is selected based on the data storage availability and performance parameters of the system. If at least a portion of the selected redundant data is to be deduplicated is determined.
    Type: Application
    Filed: October 30, 2010
    Publication date: May 3, 2012
    Applicant: International Business Machines Corporation
    Inventors: Nagapramod S. Mandagere, David A. Pease, Sandeep M. Uttamchandani, Pin Zhou
  • Publication number: 20120079097
    Abstract: The present invention proactively identifies hotspots in a cloud computing environment through cloud resource usage models that use workload parameters as inputs. In some embodiments the cloud resource usage models are based upon performance data from cloud resources and time series based workload trend models. Hotspots may occur and can be detected at any layer of the cloud computing environment, including the server, storage, and network level. In a typical embodiment, parameters for a workload are identified in the cloud computing environment and inputted into a cloud resource usage model. The model is run with the inputted workload parameters to identify potential hotspots, and resources are then provisioned for the workload so as to avoid these hotspots.
    Type: Application
    Filed: September 29, 2010
    Publication date: March 29, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sandeep Gopisetty, Seshashayee S. Murthy, Aameek Singh, Sandeep M. Uttamchandani, David D. Weck
  • Patent number: 8140682
    Abstract: A computer-implemented method for determining, from a system including a plurality of data center resources, at least one configuration of data center resources for an implementation of an application. The method includes receiving application information and receiving information regarding known internal features up the data center resources. The method also includes provisioning the system of data center resources and creating possible configurations of data center resources for implementing application. The method also includes correlating models and data center resources to create an interrelated representation of the models and the data center resources. The models predict a relationship of parameters for the possible configurations.
    Type: Grant
    Filed: December 22, 2009
    Date of Patent: March 20, 2012
    Assignee: International Business Machines Corporation
    Inventors: Seshashayee Murthy, Aameek Singh, Sandeep M. Uttamchandani
  • Patent number: 8140491
    Abstract: One embodiment retrieves a first portion of a plurality of stored objects from at least one storage device. The embodiment further performs a base type deduplication estimation process on the first portion of stored objects. The embodiment still further categorizes the first portion of the plurality of stored objects into deduplication sets based on a deduplication relationship of each object of the plurality of stored objects with each of the estimated first plurality of deduplication chunk portions. The embodiment further combines deduplication sets into broad classes based on deduplication characteristics of the objects in the deduplication sets. The embodiment still further classifies a second portion of the plurality of stored objects into broad classes using classifiers. The embodiment further selects an appropriate deduplication approach for each categorized class.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: March 20, 2012
    Assignee: International Business Machines Corporation
    Inventors: Nagapramod Mandagere, Mark A. Smith, Sandeep M. Uttamchandani, Pin Zhou
  • Publication number: 20110295815
    Abstract: Embodiments of the invention relate to testing a storage system point-in-time copy of data for consistency. An aspect of the invention includes receiving system and application event information from systems and applications associated with point-in-time copies of data. The system and application event information is associated with each of point-in-time copies of data. At least one point-in-time copy of data is selected for testing. The system and application event information is compared with inconsistency classes to determine tests for testing the point-in-time copy of data. The point-in-time copy of data is tested.
    Type: Application
    Filed: May 26, 2010
    Publication date: December 1, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nagapramod S. Mandagere, Ramani R. Routray, Sandeep M. Uttamchandani, Pin Zhou
  • Publication number: 20110258164
    Abstract: Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change.
    Type: Application
    Filed: April 20, 2010
    Publication date: October 20, 2011
    Applicant: International Business Machines Corporation
    Inventors: Nagapramod S. Mandagere, Mark J. Seaman, Sandeep M. Uttamchandani
  • Patent number: 8037349
    Abstract: A system and associated method for replicating data based on capacity optimization. A local node receives the data associated with a key. The local node within a local domain communicates with nodes of remote domains in a system through a communication network. Each domain has its own distributed hash table that partitions key space and assigns a certain key range to an owner node within the domain. For new data, the local node queries owner nodes of domains in the system progressively from the local domain to remote domains for a duplicate of the new data. Depending on a result returned by owner nodes and factors for replication strategies, the local node determines a replication strategy and records the new data in the local node pursuant to the replication strategy.
    Type: Grant
    Filed: August 28, 2009
    Date of Patent: October 11, 2011
    Assignee: International Business Machines Corporation
    Inventors: Nagapramod S. Mandagere, Seshashayee S. Murthy, Mark A. Smith, Sandeep M. Uttamchandani, Pin Zhou
  • Publication number: 20110231541
    Abstract: A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer.
    Type: Application
    Filed: March 17, 2010
    Publication date: September 22, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seshashayee S. MURTHY, Ramani R. ROUTRAY, Sandeep M. UTTAMCHANDANI