Patents by Inventor Sandeep R. Patil

Sandeep R. Patil has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170153694
    Abstract: A method for efficient battery usage in for portable devices. The method includes a service provider receiving a communication associated with a first device and a second device, wherein one of the first device and the second device is a sender of the communication and the other of the first device and the second device is an intended recipient of the communication. The service provider then determines that the first device is operating in an energy saving mode. The service provider may also determine that an emergency communication override feature for the first device has not been enabled. Upon determining that the first mobile device is operating in an energy saving mode and that an emergency communication override feature for the first device has not been enabled, the service provider determines not to send the communication to the intended recipient of the communication.
    Type: Application
    Filed: December 1, 2015
    Publication date: June 1, 2017
    Inventors: Duane M. Baldwin, Sandeep Bazar, Sandeep R. Patil, Sachin C. Punadikar
  • Publication number: 20170154192
    Abstract: A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information.
    Type: Application
    Filed: February 9, 2017
    Publication date: June 1, 2017
    Inventors: Sreekanth R. IYER, Sandeep R. PATIL, Sri RAMANATHAN, Gandhi SIVAKUMAR, Matthew B. TREVATHAN
  • Patent number: 9665485
    Abstract: One method includes assigning a pointer from multiple logical blocks to the same original physical block if the multiple logical blocks include the same data. The method further includes receiving a command to write data to the first logical block and determining if the first logical block is a frequently accessed logical block. If the first logical block is a frequently accessed logical block, ownership of the original physical block is assigned to the first logical block. If ownership is established, the method includes copying any data stored in the original physical block to a new physical block, assigning a pointer from a second logical block to the new physical block, and performing the write command on the original physical block. A system includes a processor for performing the above method. One computer program product includes computer code for performing the method described above.
    Type: Grant
    Filed: October 5, 2015
    Date of Patent: May 30, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shah M. R. Islam, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar
  • Publication number: 20170146258
    Abstract: Embodiments of the present invention provide a method and system for dynamically controlling an appliance based on information received from a wearable device, to regulate the user's health. A wearable device is identified and configured to monitor at least one physiological aspect of the user. A controllable appliance with at least one sensor and at least one controllable setting is also identified. Health information of the user is received and utilized in generating, a user profile which comprises parameters related to the health of the user. Data from the wearable device and data from the controllable appliance is analyzed and it is determined whether the data matches the parameters related to the health of the user. If the data does not match the parameters related to the health of the user, then at least one controllable setting of the at least one controllable appliance is adjusted.
    Type: Application
    Filed: August 10, 2016
    Publication date: May 25, 2017
    Inventors: Sandeep Bazar, Kaustubh I. Katruwar, Sandeep R. Patil, Sachin C. Punadikar
  • Publication number: 20170147250
    Abstract: A method and associated systems for efficient management of cloned data. One or more processors create a “child” clone of a “parent” software image. The child and parent contain identical information organized into identical sets of file blocks. To conserve storage, each child block initially points to a physical storage location already in use by a corresponding parent block, rather than requiring additional storage of its own. The first time a child block is updated, however, it will require additional physical storage. At the time of the child's creation, the processors reserve a number of physical blocks sufficient to store the contents of all child file blocks likely to be updated. A child file block is identified as likely to be updated by analyzing past volatility of a corresponding file block of the parent or of corresponding file blocks of other children of the same parent.
    Type: Application
    Filed: January 3, 2017
    Publication date: May 25, 2017
    Inventors: Blaine H. Dolph, Dean Hildebrand, Sandeep R. Patil, Riyazahamad M. Shiraguppi
  • Publication number: 20170149580
    Abstract: Embodiments of the present invention provide a method and system for dynamically controlling an appliance based on information received from a wearable device, to regulate the user's health. A wearable device is identified and configured to monitor at least one physiological aspect of the user. A controllable appliance with at least one sensor and at least one controllable setting is also identified. Health information of the user is received and utilized in generating, a user profile which comprises parameters related to the health of the user. Data from the wearable device and data from the controllable appliance is analyzed and it is determined whether the data matches the parameters related to the health of the user. If the data does not match the parameters related to the health of the user, then at least one controllable setting of the at least one controllable appliance is adjusted.
    Type: Application
    Filed: November 23, 2015
    Publication date: May 25, 2017
    Inventors: Sandeep Bazar, Kaustubh I. Katruwar, Sandeep R. Patil, Sachin C. Punadikar
  • Patent number: 9659282
    Abstract: The method includes identifying a location of an individual and an amount of time the individual will be in the location. The method further includes identifying one or more contacts of the individual that are within a threshold distance of the identified location of the individual during the identified amount time the individual will be in the location. The method further includes generating a first visitation schedule and corresponding visitation route for the individual based upon the identified status for the one or more contacts of the individual based upon social media activity, the identified frequency of interaction between the individual and the identified one or more contacts of the individual, and the determined distances from the individual to the identified one or more contacts and between each of the identified one or more contacts.
    Type: Grant
    Filed: February 17, 2016
    Date of Patent: May 23, 2017
    Assignee: International Business Machines Corpoation
    Inventors: Sasikanth Eda, Deepak R. Ghuge, John G. Musial, Sandeep R. Patil, Gandhi Sivakumar
  • Patent number: 9658781
    Abstract: A hierarchal storage management method is provided. The method includes detecting a first portion of a first file being deleted from a hybrid storage device including a hard disk drive (HDD) memory device, a solid state drive (SSD) memory device, and an archival storage memory device. A first set of memory blocks associated with the first portion of the first file is identified. The first set of memory blocks are determined to reside on the SSD memory device. In response, the first set of memory blocks are transferred from the SSD memory device to a first portion of the hybrid storage device.
    Type: Grant
    Filed: November 19, 2014
    Date of Patent: May 23, 2017
    Assignee: International Business Machines Corporation
    Inventors: Blaine H. Dolph, Nataraj Nagaratnam, Sandeep R. Patil, Riyazahamad M. Shiraguppi
  • Patent number: 9652173
    Abstract: Methods, systems, and computer program products are provided for deduplicating data. In one embodiment, a method comprises mapping a plurality of file blocks of selected data to a plurality of logical blocks, deduplicating the plurality of logical blocks to thereby associate each logical block with a corresponding physical block of a plurality of physical blocks located on a physical memory device, two or more of the corresponding physical blocks being non-contiguous with each other, and determining whether one or more of the corresponding physical blocks are one or more frequently accessed physical blocks being accessed at a frequency above a threshold frequency and being referred to by a common set of applications.
    Type: Grant
    Filed: September 9, 2015
    Date of Patent: May 16, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Duane M. Baldwin, Clodoaldo Barrera, Milhail C. Constantinescu, Sandeep R. Patil, Riyazahamad M. Shiraguppi
  • Publication number: 20170132242
    Abstract: A mechanism is provided in a data processing system for de-duplication aware secure delete. Responsive to receiving a secure delete request for a file, the mechanism identifies a list of file blocks to be securely deleted from a physical disk device. Responsive to determining at least one virtual block of another file refers to a given disk block corresponding to a file block in the list, the mechanism copies the given disk block to generate a copied disk block in the physical disk device and updates a pointer of the at least one virtual block to refer to the copied disk block. The mechanism writes a secure delete pattern for each file block in the list of file blocks to a disk block in the physical disk device without performing de-duplication processing.
    Type: Application
    Filed: July 13, 2015
    Publication date: May 11, 2017
    Inventors: Kalyan C. Gunda, Sandeep R. Patil, Subhojit Roy, Riyazahamad M. Shiraguppi
  • Publication number: 20170132090
    Abstract: Embodiments of the present invention provide a method, computer program product, and computer system for leveraging checkpoint restart. The method includes determining a first set of work stages within a first computation algorithm. A set of permissions associated with the first set of work stages are identified, and the work stages are stored as checkpoints in either a public location or a private location. Upon deployment of a second computation algorithm, a second set of work stages within the second computation algorithm is compared to the first set of work stages. If the second set of work stages match with the first set of work stages, the second computation algorithm is executed using the checkpoint associated with the matching work stages.
    Type: Application
    Filed: July 14, 2016
    Publication date: May 11, 2017
    Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
  • Publication number: 20170131923
    Abstract: Embodiments of the present invention provide a method, computer program product, and computer system for leveraging checkpoint restart. The method includes determining a first set of work stages within a first computation algorithm. A set of permissions associated with the first set of work stages are identified, and the work stages are stored as checkpoints in either a public location or a private location. Upon deployment of a second computation algorithm, a second set of work stages within the second computation algorithm is compared to the first set of work stages. If the second set of work stages match with the first set of work stages, the second computation algorithm is executed using the checkpoint associated with the matching work stages.
    Type: Application
    Filed: November 5, 2015
    Publication date: May 11, 2017
    Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
  • Patent number: 9641971
    Abstract: A mechanism is provided for enabling separation of compute infrastructure built within a geographically located storage device. A determination is made as to whether a compute request originates from a geographical location that is the same as a geographical location of the geographically located storage device. Responsive to the compute request originating from a geographical location different from the geographical location of the geographically located storage device, a determination is made as to whether the compute request complies with governing requirements that govern the geographically located storage device. Responsive to the compute request complying with the requirements that govern the geographically located storage device, a determination is made as to whether the compute request is for data retrieval only. Responsive to the compute request being for data retrieval only, the requested data is gathered from data storage of the geographically located storage device and sent to a requesting client.
    Type: Grant
    Filed: February 12, 2015
    Date of Patent: May 2, 2017
    Assignee: International Business Machines Corporation
    Inventors: Sasikanth Eda, Dean Hildebrand, Varun Mittal, William W. Owen, Sandeep R. Patil
  • Patent number: 9641493
    Abstract: An approach is provided for protecting data owned by an operating system on a mobile computing device having multiple operating systems. A map specifying protected data regions for the operating systems is generated. The map is secured with a shared key retrieved from a data structure. Based on the shared key, a tuple specifying the data region is retrieved from the data structure. Based on the map, the shared key, and the tuple, and responsive to a data cleanup activity being performed by a software utility being executed on another, currently running operating system included in the multiple operating systems, a data region included in the protected data regions is determined to be owned by the operating system. Based on the data region being owned by the operating system and specified by the map, the data cleanup activity is blocked from being performed on the data region.
    Type: Grant
    Filed: May 13, 2016
    Date of Patent: May 2, 2017
    Assignee: International Business Machines Corporation
    Inventors: Blaine H. Dolph, Miku K. Jha, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar
  • Publication number: 20170116675
    Abstract: A method is provided to use a weighted model for determining a term insurance premium based on each operation performed by a user in a software defined infrastructure. For each operation performed by the user, the operation is classified and weighted against its results, and risk associated with the results is analyzed. A term insurance amount is calculated based on the risk for recovery, and expertise of IT resource vendor. An end user is equipped with flexibility of enabling insurance for a particular software operation.
    Type: Application
    Filed: October 27, 2015
    Publication date: April 27, 2017
    Inventors: Sasikanth Eda, Deepak R. Ghuge, Varun Mittal, Sandeep R. Patil, Gandhi Sivakumar
  • Publication number: 20170116214
    Abstract: Methods, systems, and computer program products are provided for optimizing selection of files for eviction from a first storage pool to free up a predetermined amount of space in the first storage pool. A method includes analyzing an effective space occupied by each file of a plurality of files in the first storage pool, selecting one or more of the plurality of files as one or more candidate files for eviction, based on the identified one or more data blocks, and evicting the one or more candidate files for eviction from the first storage pool to a second storage pool.
    Type: Application
    Filed: January 6, 2017
    Publication date: April 27, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Duane M. BALDWIN, Sandeep R. PATIL, Riyazahamad M. SHIRAGUPPI, Prashant SODHIYA
  • Patent number: 9628433
    Abstract: A method for transmitting short message service (SMS) messages and notifications within a virtualized wireless device is provided. In one embodiment, a hypervisor detects an incoming SMS message directed to a virtualized wireless device that comprises at least two virtual operating systems. The hypervisor further transmits the incoming SMS message to a first virtual operating system of the virtualized wireless device. In addition, the hypervisor notifies a second virtual operating system of the virtualized wireless device of the incoming SMS message.
    Type: Grant
    Filed: August 27, 2013
    Date of Patent: April 18, 2017
    Assignee: International Business Machines Corporation
    Inventors: Blaine H. Dolph, Miku K. Jha, Sandeep R. Patil, Gandhi Sivakumar, Matthew B. Trevathan
  • Patent number: 9621557
    Abstract: A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information.
    Type: Grant
    Filed: January 28, 2016
    Date of Patent: April 11, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sreekanth R. Iyer, Sandeep R. Patil, Sri Ramanathan, Gandhi Sivakumar, Matthew B. Trevathan
  • Patent number: 9619357
    Abstract: Systems for reducing power consumption and power leakage in hybrid storage clusters is provided. More specifically, the system is for allocating an appropriate server amongst a plurality of servers in a network by identifying an application to be executed in a network, wherein the network comprises a plurality of servers configured to execute the applications, and each server further comprising a hybrid memory system; based on the application to be executed, dynamically identifying resources to execute the application based on the hybrid memory system available and the power consumption for executing the application; and dynamically allocating the application to the identified resource for execution.
    Type: Grant
    Filed: September 28, 2011
    Date of Patent: April 11, 2017
    Assignee: International Business Machines Corporation
    Inventors: Bhushan P. Jain, Sri Ramanathan, Sandeep R. Patil, Abhinay R. Nagpal
  • Patent number: 9613040
    Abstract: In one embodiment, a method for managing data includes receiving a request to write data to a file block on a multi-tier file system. A first logical block is associated with the file block. The method also includes determining whether the request is a first write request for the file block after creation of a snapshot of the file block. Moreover, the method includes determining an access request count for the first logical block prior to creation of the snapshot by retrieving the access request count for the first logical block from a snapshot data table accessible to an automatic tiering module. Other methods for managing data are presented in accordance with other embodiments.
    Type: Grant
    Filed: March 24, 2016
    Date of Patent: April 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: John T. Olson, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gail A. Spear