Patents by Inventor Sasikanth Eda

Sasikanth Eda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170286178
    Abstract: A first storlet engine is monitored for a first computational algorithm. The storlet engine includes a lookup table including a first characteristic of one or more nodes, a parser unit, and a resource availability monitor. The first computational algorithm is parsed into an abstract syntax tree using a parser unit. A first category of the first computational algorithm is determined by analyzing the abstract syntax tree. A first node of the lookup table with the first characteristic matching the first category for processing the first computational algorithm is identified based on the first category of the computational algorithm. The first computational algorithm is sent to the first node for processing.
    Type: Application
    Filed: March 31, 2016
    Publication date: October 5, 2017
    Inventors: Brijesh Chougule, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil, Sanjay K. Sudam
  • Publication number: 20170286707
    Abstract: A processor may identify a first directory in the UFO storage system. The first directory may include one or more subdirectories in one or more levels under the first directory. The one or more subdirectories may include a second directory that has includes one or more objects. The first directory may be associated with a first inode, and the second directory may be associated with a second inode. The processor may perform a stat call on the second directory to determine metadata attributes for the one or more objects that are stored in the second directory. The metadata attributes for the one or more objects may be stored in the second inode. The processor may add the metadata attributes for the one or more objects to the first inode.
    Type: Application
    Filed: March 30, 2016
    Publication date: October 5, 2017
    Inventors: Sasikanth Eda, Dean Hildebrand, Ashutosh V. Mate, Varun Mittal, William W. Owen, Sandeep R. Patil, Smita J. Raut
  • Publication number: 20170286967
    Abstract: An aspect of wearable technology device processes includes receiving, by a wireless receiver of a wearable technology device, a transaction authorization request and a transaction amount from a contactless transaction terminal. An aspect also includes comparing the transaction amount with a current balance associated with an account of an individual corresponding to the wearable technology device. Upon determining the transaction amount causes the current balance to fall below a limit specified by user-defined settings, an aspect includes retrieving a set of a plurality of tired confirmation prompts from a memory of the wearable technology device, and displaying, via an output component of the wearable technology device a first confirmation prompt from the set. The first confirmation prompt is displayed at a first time interval and before completion of the transaction. Each succeeding confirmation prompt provides increased emphasis in its content or presentation.
    Type: Application
    Filed: April 5, 2016
    Publication date: October 5, 2017
    Inventors: Peter A. Balinski, Sasikanth Eda, John G. Musial, Sandeep R. Patil, Todd R. Whitman
  • Patent number: 9760954
    Abstract: Visual focal point composition of media capture based on a target audience is provided. An aspect includes activating a profile selection function via a media recording device and receiving, via the profile selection function, an identifier of a target viewer of media content. The profile selection function provides a list of social network contacts, including the target viewer, via the media recording device. Another aspect includes retrieving contact preferences associated with the identifier. The contact preferences are determined from data about the target viewer that is sourced from one or more compartmentalized entities. The contact preferences identify focal aspects of media content statistically determined to be of interest by the target viewer. A further aspect includes providing suggested focal aspects of a scene subject to media capture. The suggested focal aspects are derived from the contact preferences.
    Type: Grant
    Filed: January 16, 2014
    Date of Patent: September 12, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peter A. Balinski, Sasikanth Eda, John G. Musial, Sandeep R. Patil
  • Patent number: 9740705
    Abstract: A method for adjusting roles of nodes in a distributed clustered file system can include receiving a first computation operation. The method can also include profiling the first computation operation according to one or more metrics, including identifying and categorizing a first process performed by the first computation operation. The method can also include determining a first file system attribute of the first computation operation. The method can also include performing a lookup operation based on a first computation operation template and identifying that the first computation operation serves a first file system role. The method can also include receiving an identification, in response to the performing the lookup, that a first node of a plurality of nodes can utilize additional computation of the first file system role. The method can also include executing the first computation operation on the first node.
    Type: Grant
    Filed: December 4, 2015
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
  • Publication number: 20170185305
    Abstract: A method for optimizing duplication of disk sector architecture in a heterogeneous cloud systems environment, is provided. The method includes identifying a file system platform and name space for tracking a plurality of disk, of the disk sector architecture. The method further includes configuring a systems framework, of the identified file system platform, for collecting information of the plurality of disk assigned to the file systems platform. The method further includes equipping the file system platform and a monitoring system with learning or knowledge based engines to identify workload types for utilizing the file system platform and the named space to identify health of multiple platters of the plurality of disk assigned to the file systems platform. The method further includes calculating duplication data of sectors of the plurality of disks of the identified workload types, based on the sectors of disks.
    Type: Application
    Filed: December 28, 2015
    Publication date: June 29, 2017
    Inventors: Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil, Sanjay K. Sudam
  • Publication number: 20170161298
    Abstract: A method for adjusting roles of nodes in a distributed clustered file system can include receiving a first computation operation. The method can also include profiling the first computation operation according to one or more metrics, including identifying and categorizing a first process performed by the first computation operation. The method can also include determining a first file system attribute of the first computation operation. The method can also include performing a lookup operation based on a first computation operation template and identifying that the first computation operation serves a first file system role. The method can also include receiving an identification, in response to the performing the lookup, that a first node of a plurality of nodes can utilize additional computation of the first file system role. The method can also include executing the first computation operation on the first node.
    Type: Application
    Filed: December 4, 2015
    Publication date: June 8, 2017
    Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
  • Publication number: 20170161286
    Abstract: A method, computer program product and/or system saves an original logical block in a file system and generates a first heatmap reflecting access operations on the original logical block. After taking of a file system snapshot, and receiving information that the original logical block is going to be revised, a second heatmap is generated, reflecting predicted access operations on the revised logical block. The second heatmap is based, at least in part, on the first heatmap. Selecting a physical storage location for the revised logical block is based on the second heatmap.
    Type: Application
    Filed: December 8, 2015
    Publication date: June 8, 2017
    Inventors: Sasikanth Eda, Shah M. R. Islam, John T. Olson, Sandeep R. Patil
  • Patent number: 9659282
    Abstract: The method includes identifying a location of an individual and an amount of time the individual will be in the location. The method further includes identifying one or more contacts of the individual that are within a threshold distance of the identified location of the individual during the identified amount time the individual will be in the location. The method further includes generating a first visitation schedule and corresponding visitation route for the individual based upon the identified status for the one or more contacts of the individual based upon social media activity, the identified frequency of interaction between the individual and the identified one or more contacts of the individual, and the determined distances from the individual to the identified one or more contacts and between each of the identified one or more contacts.
    Type: Grant
    Filed: February 17, 2016
    Date of Patent: May 23, 2017
    Assignee: International Business Machines Corpoation
    Inventors: Sasikanth Eda, Deepak R. Ghuge, John G. Musial, Sandeep R. Patil, Gandhi Sivakumar
  • Publication number: 20170132090
    Abstract: Embodiments of the present invention provide a method, computer program product, and computer system for leveraging checkpoint restart. The method includes determining a first set of work stages within a first computation algorithm. A set of permissions associated with the first set of work stages are identified, and the work stages are stored as checkpoints in either a public location or a private location. Upon deployment of a second computation algorithm, a second set of work stages within the second computation algorithm is compared to the first set of work stages. If the second set of work stages match with the first set of work stages, the second computation algorithm is executed using the checkpoint associated with the matching work stages.
    Type: Application
    Filed: July 14, 2016
    Publication date: May 11, 2017
    Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
  • Publication number: 20170131923
    Abstract: Embodiments of the present invention provide a method, computer program product, and computer system for leveraging checkpoint restart. The method includes determining a first set of work stages within a first computation algorithm. A set of permissions associated with the first set of work stages are identified, and the work stages are stored as checkpoints in either a public location or a private location. Upon deployment of a second computation algorithm, a second set of work stages within the second computation algorithm is compared to the first set of work stages. If the second set of work stages match with the first set of work stages, the second computation algorithm is executed using the checkpoint associated with the matching work stages.
    Type: Application
    Filed: November 5, 2015
    Publication date: May 11, 2017
    Inventors: Pradipta K. Banerjee, Sasikanth Eda, Deepak R. Ghuge, Sandeep R. Patil
  • Patent number: 9641971
    Abstract: A mechanism is provided for enabling separation of compute infrastructure built within a geographically located storage device. A determination is made as to whether a compute request originates from a geographical location that is the same as a geographical location of the geographically located storage device. Responsive to the compute request originating from a geographical location different from the geographical location of the geographically located storage device, a determination is made as to whether the compute request complies with governing requirements that govern the geographically located storage device. Responsive to the compute request complying with the requirements that govern the geographically located storage device, a determination is made as to whether the compute request is for data retrieval only. Responsive to the compute request being for data retrieval only, the requested data is gathered from data storage of the geographically located storage device and sent to a requesting client.
    Type: Grant
    Filed: February 12, 2015
    Date of Patent: May 2, 2017
    Assignee: International Business Machines Corporation
    Inventors: Sasikanth Eda, Dean Hildebrand, Varun Mittal, William W. Owen, Sandeep R. Patil
  • Publication number: 20170116675
    Abstract: A method is provided to use a weighted model for determining a term insurance premium based on each operation performed by a user in a software defined infrastructure. For each operation performed by the user, the operation is classified and weighted against its results, and risk associated with the results is analyzed. A term insurance amount is calculated based on the risk for recovery, and expertise of IT resource vendor. An end user is equipped with flexibility of enabling insurance for a particular software operation.
    Type: Application
    Filed: October 27, 2015
    Publication date: April 27, 2017
    Inventors: Sasikanth Eda, Deepak R. Ghuge, Varun Mittal, Sandeep R. Patil, Gandhi Sivakumar
  • Publication number: 20170090758
    Abstract: An integrated controller for implementing a quality of service when storing input/output data across an array is provided. The integrated controller receives the input/output data from at least one of a file system and an upper layer application. The input/output data can be associated with a quality of service classification. The integrated controller also splits the input/output data into data chunks and determines whether the quality of service classification indicates a first priority or a second priority for each of the data chunks. Then, if the quality of service classification indicates the first priority, the integrated controller proceeds to place the data chunks across a first partition of a disk of the array.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 30, 2017
    Inventors: PETER A. BALINSKI, SASIKANTH EDA, JOHN G. MUSIAL, SANDEEP R. PATIL
  • Publication number: 20170090765
    Abstract: An integrated controller for implementing a quality of service when storing input/output data across an array is provided. The integrated controller receives the input/output data from at least one of a file system and an upper layer application. The input/output data can be associated with a quality of service classification. The integrated controller also splits the input/output data into data chunks and determines whether the quality of service classification indicates a first priority or a second priority for each of the data chunks. Then, if the quality of service classification indicates the first priority, the integrated controller proceeds to place the data chunks across a first partition of a disk of the array.
    Type: Application
    Filed: November 24, 2015
    Publication date: March 30, 2017
    Inventors: PETER A. BALINSKI, SASIKANTH EDA, JOHN G. MUSIAL, SANDEEP R. PATIL
  • Publication number: 20170063099
    Abstract: Embodiments are directed to a system for transferring power wirelessly from a transmitter to a receiver, the transmitter having a transmitter processor and a transmitter antenna. The system includes the transmitter processor configured to convert electric power signals to an electromagnetic field (EMF); associate each of a plurality of keys with one of a plurality of operating frequencies, and store the plurality of keys associated with the plurality of operating frequencies in a table; select one of the plurality of operating frequencies stored in the table as an active operating frequency, wherein the active operating frequency is assigned as the current operating frequency of the transmitter antenna, and wherein the key associated with the active operating frequency is assigned as an active key; wirelessly transmit to the receiver the EMF at the active operating frequency; and wirelessly transmit to the receiver the table and an identification of the active key.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Inventors: Lydia M. Do, Sasikanth Eda, Riyazahamad M. Shiraguppi
  • Publication number: 20170063103
    Abstract: Embodiments are directed to a system for transferring power wirelessly from a transmitter to a receiver, the transmitter having a transmitter processor and a transmitter antenna. The system includes the transmitter processor configured to convert electric power signals to an electromagnetic field (EMF); associate each of a plurality of keys with one of a plurality of operating frequencies, and store the plurality of keys associated with the plurality of operating frequencies in a table; select one of the plurality of operating frequencies stored in the table as an active operating frequency, wherein the active operating frequency is assigned as the current operating frequency of the transmitter antenna, and wherein the key associated with the active operating frequency is assigned as an active key; wirelessly transmit to the receiver the EMF at the active operating frequency; and wirelessly transmit to the receiver the table and an identification of the active key.
    Type: Application
    Filed: November 24, 2015
    Publication date: March 2, 2017
    Inventors: Lydia M. Do, Sasikanth Eda, Riyazahamad M. Shiraguppi
  • Publication number: 20170054796
    Abstract: According to one exemplary embodiment, a method for embedded compute engine architecture optimization is provided. The method may include receiving an object. The method may also include determining a first category for the received object, whereby the determined first category is associated with a node. The method may then include storing the received object on the node associated with the determined first category. The method may further include receiving an algorithm. The method may also include determining a second category for the received algorithm, whereby the determined second category is associated with the node. The method may then include executing the received algorithm on the node, whereby the received algorithm uses the received object stored on the node.
    Type: Application
    Filed: August 19, 2015
    Publication date: February 23, 2017
    Inventors: Sasikanth Eda, Deepak R. Ghuge, Kaustubh I. Katruwar, Sandeep R. Patil
  • Publication number: 20170012897
    Abstract: Aspects of the present invention disclose a method for optimizing shared services orchestration. The method includes one or more computer processors receiving resource requirements from a client. The method further includes one or more computer processors determining a list of rules. The method further includes one or more computer processors determining at least one resource based on the resource requirements and the list of rules. The method further includes one or more computer processors deploying at least one resource from the determined at least one resource.
    Type: Application
    Filed: July 10, 2015
    Publication date: January 12, 2017
    Inventors: Sasikanth Eda, Varun Mittal, Sachin C. Punadikar, Sandeep R. Patil
  • Publication number: 20160366217
    Abstract: An efficient cloning mechanism is provided for a distributed storage environment, where, for example, a private cloud computing environment and a public cloud computing environment are included in a hybrid cloud computing environment (on-premise object storage to off-premise computation resources), to improve computation workloads. The disclosed algorithm forms an efficient cloning mechanism in a hybrid storage environment where the read/write speed of data from the disk is not limited by its angular velocity.
    Type: Application
    Filed: June 12, 2015
    Publication date: December 15, 2016
    Inventors: Sasikanth Eda, Deepak R. Ghuge, Yu-Cheng Hsu, Sandeep R. Patil