Patents by Inventor Sandeep Ramesh Patil
Sandeep Ramesh Patil has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190379400Abstract: Systems for location selection based on erasure code techniques are provided. One system includes a monitor module that monitors data speed characteristics for one or more locations on a storage device. Additionally, the system includes a classification module that determines an erasure code technique for an application, wherein data associated with the application is stored on a storage device. Also, the system includes a selection module that selects a location in one or more locations for storing data based on monitored data speed characteristics and a determined erasure code technique.Type: ApplicationFiled: June 12, 2018Publication date: December 12, 2019Inventors: Sasikanth Eda, Poornima Gupte, Sukumar Vankadhara, Sandeep Ramesh Patil
-
Publication number: 20190188186Abstract: A computer-implemented method, according to one embodiment, includes: dividing a namespace in a central storage location into more than one cell. A first of the more than one cell is a common cell, which is configured to store management data received from remote storage locations coupled to the central storage location. Each of the remaining cells are configured to store object data received from a respective one of the remote storage locations. Management data received from the remote storage locations is stored in the common cell of the central storage location. Object data is also received, where the object data corresponds to the management data received from the remote storage locations. Furthermore, the received object data is stored in the respective cells of the central storage location. Other systems, methods, and computer program products are described in additional embodiments.Type: ApplicationFiled: February 7, 2019Publication date: June 20, 2019Inventors: Sasikanth Eda, Sanjay Vipin Gandhi, Dean Hildebrand, Trishali Satish Nayar, Brian Nelson, William W. Owen, Sandeep Ramesh Patil, Smita J. Raut
-
Patent number: 10321368Abstract: A computer-implemented method, according to one embodiment, includes: receiving, by the computer, information. The information includes: contextual information associated with a communication request, an expiry time which corresponds to the communication request, one or more identities corresponding to the communication request, and communication resources associated with the communication request. Furthermore, the communication resources include a channel and/or a spectrum band which correspond to the communication request. The expiry time is packaged, by the computer, with the communication resources. Moreover, the packaged expiry time and communication resources are passed, by the computer, to devices corresponding to each of the one or more identities. Other systems, methods, and computer program products are described in additional embodiments.Type: GrantFiled: June 21, 2018Date of Patent: June 11, 2019Assignee: International Business Machines CorporationInventors: Gandhi Sivakumar, Rajan Dilavar Mithani, Sandeep Ramesh Patil, Sasikanth Eda, Abhishek Jain
-
Publication number: 20190171621Abstract: A computer-implemented method, according to one embodiment, includes: sending management data to a designated common cell in a namespace of a central storage location from one or more remote storage locations. The management data corresponds to object data stored at the one or more remote storage locations. the object data stored at each of the one or more remote storage locations is further transferred to a respective cell in the namespace of the central storage location. Moreover, a modified consistency hashing algorithm configuration is implemented. The modified consistency hashing algorithm configuration routes updates of existing object data in the one or more remote storage locations to the respective cells in the central storage location. Other systems, methods, and computer program products are described in additional embodiments.Type: ApplicationFiled: February 7, 2019Publication date: June 6, 2019Inventors: Sasikanth Eda, Sanjay Vipin Gandhi, Dean Hildebrand, Trishali Satish Nayar, Brian Nelson, William W. Owen, Sandeep Ramesh Patil, Smita J. Raut
-
Publication number: 20190158477Abstract: A cognitive psychology authentication in a multi-factor authentication system. A request is received to access a secure resource associated with a user. A set of cognitive psychology questions are selected from a plurality of cognitive psychology questions for transmission to a client device associated with the request. A set of responses corresponding to the set of cognitive psychology questions are received and cognitive psychology data is generated based on the set of responses. A cognitive psychology profile associated with the user is retrieved from a database. An authentication score is calculated based on comparing the cognitive psychology data to the cognitive psychology profile. An authentication success notification is transmitted when the authentication score compares favorably to an authentication threshold. An authentication failure notification is transmitted when the authentication score compares unfavorably to the authentication threshold.Type: ApplicationFiled: November 22, 2017Publication date: May 23, 2019Inventors: Nataraj Nagaratnam, Pamela A. Nesbitt, Sandeep Ramesh Patil, Sasikanth Eda
-
Patent number: 10248659Abstract: A computer-implemented method, according to one embodiment, includes: creating a namespace in a central storage location, and dividing the namespace into more than one cell. A first cell is a common cell configured to store management data received from remote storage locations coupled to the central storage location. Each of the remaining cells are configured to store object data received from a respective one of the remote storage locations. The computer-implemented method further includes: receiving management data from the remote storage locations, storing the received management data in the common cell of the central storage location, receiving object data corresponding to the management data received from the remote storage locations, and storing the received object data in the respective cells of the central storage location. The management data corresponds to object data stored in the remote storage locations.Type: GrantFiled: October 4, 2016Date of Patent: April 2, 2019Assignee: International Business Machines CorporationInventors: Sasikanth Eda, Sanjay Vipin Gandhi, Dean Hildebrand, Trishali Satish Nayar, Brian Nelson, William W. Owen, Sandeep Ramesh Patil, Smita J. Raut
-
Publication number: 20180095988Abstract: A computer-implemented method, according to one embodiment, includes: creating a namespace in a central storage location, and dividing the namespace into more than one cell. A first cell is a common cell configured to store management data received from remote storage locations coupled to the central storage location. Each of the remaining cells are configured to store object data received from a respective one of the remote storage locations. The computer-implemented method further includes: receiving management data from the remote storage locations, storing the received management data in the common cell of the central storage location, receiving object data corresponding to the management data received from the remote storage locations, and storing the received object data in the respective cells of the central storage location. The management data corresponds to object data stored in the remote storage locations.Type: ApplicationFiled: October 4, 2016Publication date: April 5, 2018Inventors: Sasikanth Eda, Sanjay Vipin Gandhi, Dean Hildebrand, Trishali Satish Nayar, Brian Nelson, William W. Owen, Sandeep Ramesh Patil, Smita J. Raut
-
Patent number: 9881039Abstract: Systems and methods to manage database data are provided. A particular method includes automatically identifying a plurality of storage devices. The storage devices include a first device of a first type and a second device of a second type. The first type includes a solid state memory device. The method may further identify a high priority data set of the database. A rebalancing operation is conducted that includes moving the high priority data set to the solid state memory device and substantially evening distribution of other data of the database among the storage devices.Type: GrantFiled: May 26, 2009Date of Patent: January 30, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yan Wang Stein, Harshwardhan S. Mulay, Abhinay R. Nagpal, Sandeep Ramesh Patil
-
Patent number: 9495377Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and performing a secure deletion of the copy at the home site immediately after a reconnection event of the cache site to the home site.Type: GrantFiled: September 12, 2012Date of Patent: November 15, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lawrence Carter Blount, Deepak Rambahu Ghuge, Shah Mohammad Rezaul Islam, Sandeep Ramesh Patil, Riyazahamad Moulasab Shiraguppi, Renu Tewari
-
Patent number: 9280557Abstract: Virtual file system virtual nodes are grouped in subpools in response to identified resource components and managed as a function of their subpool groupings. Virtual nodes are decomposed into individual components linked to each other within each node. The components that have repetitive accesses by applications within the virtual file system and their respective frequencies of repetitive access are identified. Modules of linked occurrences of the repetitive components within each of the plurality of virtual nodes are formed, and subsets of the virtual nodes sharing common modules are grouped into subpools. Accordingly, in response to an application of the virtual file system requesting a service that is satisfied by a subpool common module, selection of a virtual node for reinitiating for reuse by the application is restricted to virtual nodes within the subpool associated with the common module.Type: GrantFiled: March 23, 2015Date of Patent: March 8, 2016Assignee: International Business Machines CorporationInventors: Abhinay R. Nagpal, Sandeep Ramesh Patil, Sri Ramanathan, Matthew B. Trevathan
-
Patent number: 9152325Abstract: One method includes assigning a pointer from multiple logical blocks to the same original physical block if the multiple logical blocks include the same data. The method further includes receiving a command to write data to the first logical block and determining if the first logical block is a frequently accessed logical block. If the first logical block is a frequently accessed logical block, ownership of the original physical block is assigned to the first logical block. If ownership is established, the method includes copying any data stored in the original physical block to a new physical block, assigning a pointer from a second logical block to the new physical block, and performing the write command on the original physical block. A system includes a processor for performing the above method. One computer program product includes computer code for performing the method described above.Type: GrantFiled: July 26, 2012Date of Patent: October 6, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rezaul Shah Mohammad Islam, Sandeep Ramesh Patil, Riyazahamad Moulasab Shiraguppi, Gandhi Sivakumar
-
Patent number: 9104682Abstract: An automated, embedded & intelligent E-mail Attachment Document manager automatically tracks email and their associated attachments and assists users in locating an email message (email-chain/thread) that is the original source from where the email attachment document. The present invention can perform the tracking action using the given name of the saved attachment file.Type: GrantFiled: July 15, 2008Date of Patent: August 11, 2015Assignee: International Business Machines CorporationInventors: Dwip N. Banerjee, Sandeep Ramesh Patil, Venkat Venkatsubra
-
Patent number: 9092452Abstract: Virtual file system virtual nodes are grouped in subpools in response to identified resource components and managed as a function of their subpool groupings. Virtual nodes are decomposed into individual components linked to each other within each node. The components that have repetitive accesses by applications within the virtual file system and their respective frequencies of repetitive access are identified. Modules of linked occurrences of the repetitive components within each of the plurality of virtual nodes are formed, and subsets of the virtual nodes sharing common modules are grouped into subpools. Accordingly, in response to an application of the virtual file system requesting a service that is satisfied by a subpool common module, selection of a virtual node for reinitiating for reuse by the application is restricted to virtual nodes within the subpool associated with the common module.Type: GrantFiled: June 27, 2013Date of Patent: July 28, 2015Assignee: International Business Machines CorporationInventors: Abhinay R. Nagpal, Sandeep Ramesh Patil, Sri Ramanathan, Matthew B. Trevathan
-
Publication number: 20150193467Abstract: Virtual file system virtual nodes are grouped in subpools in response to identified resource components and managed as a function of their subpool groupings. Virtual nodes are decomposed into individual components linked to each other within each node. The components that have repetitive accesses by applications within the virtual file system and their respective frequencies of repetitive access are identified. Modules of linked occurrences of the repetitive components within each of the plurality of virtual nodes are formed, and subsets of the virtual nodes sharing common modules are grouped into subpools. Accordingly, in response to an application of the virtual file system requesting a service that is satisfied by a subpool common module, selection of a virtual node for reinitiating for reuse by the application is restricted to virtual nodes within the subpool associated with the common module.Type: ApplicationFiled: March 23, 2015Publication date: July 9, 2015Inventors: Abhinay R. Nagpal, Sandeep Ramesh Patil, Sri Ramanathan, Matthew B. Trevathan
-
Patent number: 9009435Abstract: Systems and computer program products are provided for optimizing selection of files for deletion from one or more data storage devices to free up a predetermined amount of space in the one or more data storage devices. A method includes analyzing an effective space occupied by each file of a plurality of files in the one or more data storage devices, identifying, from the plurality of files, one or more data blocks making up a file to free up the predetermined amount of space based on the analysis of the effective space of each file of the plurality of files, selecting one or more of the plurality of files as one or more candidate files for deletion, based on the identified one or more data blocks, and deleting the one or more candidate files for deletion from the one or more data storage devices.Type: GrantFiled: August 13, 2012Date of Patent: April 14, 2015Assignee: International Business Machines CorporationInventors: Duane Mark Baldwin, Sandeep Ramesh Patil, Riyazahamad Moulasab Shiraguppi, Prashant Sodhiya
-
Patent number: 9009434Abstract: Systems and computer program products are provided for optimizing selection of files for eviction from a first storage pool to free up a predetermined amount of space in the first storage pool. A method includes analyzing an effective space occupied by each file of a plurality of files in the first storage pool, identifying, from the plurality of files, one or more data blocks making up a file to free up the predetermined amount of space based on the analysis of the effective space of each file of the plurality of files, selecting one or more of the plurality of files as one or more candidate files for eviction, based on the identified one or more data blocks, and evicting the one or more candidate files for eviction from the first storage pool to a second storage pool.Type: GrantFiled: August 13, 2012Date of Patent: April 14, 2015Assignee: International Business Machines CorporationInventors: Duane Mark Baldwin, Sandeep Ramesh Patil, Riyazahamad Moulasab Shiraguppi, Prashant Sodhiya
-
Patent number: 8862538Abstract: According to one embodiment of the present disclosure, a method and technique is disclosed for maintaining a network connection during transfer of the workload from a global environment of a logical partition to a workload partition of the logical partition and during any subsequent transfer(s).Type: GrantFiled: December 18, 2008Date of Patent: October 14, 2014Assignee: International Business Machines CorporationInventors: Sandeep Ramesh Patil, Ranadip Das, Rajeev Mishra
-
Patent number: 8839105Abstract: A multi-display system and method supporting differing accessibility feature selection provides a suitable display for a user with limited visual acuity, while providing a second display having a different accessibility feature set to a second user. An application or operating system checks selected accessibility features and display settings corresponding to each graphical display device and generates multiple graphical outputs in conformity with program output and the corresponding accessibility features and display settings for each device. One graphical display may be a personal computer display and the other a projector, so that an accessible desktop can be presented to the presenter, while the presentation can be shown with a desired set of attributes. The operating system may support the above-described operation by generating the multiple display outputs from the accessibility settings and a single program output.Type: GrantFiled: December 1, 2006Date of Patent: September 16, 2014Assignee: International Business Machines CorporationInventors: Dwip N. Banerjee, Ranadip Das, Sandeep Ramesh Patil, Venkat Venkatsubra
-
Patent number: 8836811Abstract: An embodiment of the invention includes a method for managing media files created by a digital camera. More specifically, a content analyzing module tags a media file with one or more location media tags, event media tags, and/or content media tags. The location media tags are indicative of the geographic location where the media file was created. The event media tags are indicative of an event where the media file was created; and, the content media tags are indicative of individual(s) in the media file. A priority analyzing module connected to the content analyzing module determines a priority of the media file based on priority rules and the location media tags, event media tags, and/or the content media tags. A storage management module connected to the priority analyzing module stores the media file based on the determined priority.Type: GrantFiled: January 14, 2013Date of Patent: September 16, 2014Assignee: International Business Machines CorporationInventors: Suyash S. Jape, John Gerard Musial, Abhinay Ravinder Nagpal, Sandeep Ramesh Patil
-
Patent number: 8805797Abstract: Methods, systems, and physical computer-readable storage medium are provided to optimize WAN traffic on cloud networking sites. In an embodiment, by way of example only, a method includes fetching deduplication information from a home site to build a repository comprising duplicate peer file sets, one or more of the duplicate peer file sets including one or more peer files, referring to the repository to determine whether a target file corresponds with a cache copy of a peer file of the one or more peer files included in the duplicate peer file sets, and creating a local copy of the peer file of the one or more peer files, if a determination is made that the target file corresponds with the cache copy of the peer file of the one or more peer files included in the duplicate peer file sets.Type: GrantFiled: February 22, 2012Date of Patent: August 12, 2014Assignee: International Business Machines CorporationInventors: Kalyan Chakravarthy Gunda, Shah Mohammad Rezaul Islam, Sandeep Ramesh Patil, Riyazahamad Moulasab Shiraguppi