Patents by Inventor Sasikanth Eda

Sasikanth Eda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10831602
    Abstract: Methods that can dynamically merge parity data for multiple data stripes are provided. One method includes detecting, by a processor, a disk failure in a redundant array of independent disks (RAID) configuration and, in response to detecting the disk failure, merging parity data stored in a plurality of sets of segments in a stripe of the RAID configuration to free space in a set of parity segments of the plurality of sets of segments. Systems and computer program products for performing the method are also provided.
    Type: Grant
    Filed: April 6, 2018
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Kushal Patel, Karve Shrikant Vinod, Sarvesh Patel, Sasikanth Eda
  • Patent number: 10834769
    Abstract: Embodiments for managing a wireless communication network by one or more processors are described. The presence of a plurality of mobile electronic devices within a wireless communication network is detected. A device-to-device (D2D) connectability score for each of the plurality of mobile electronic devices is calculated. The calculating of the D2D connectability score for each of the plurality of mobile electronic devices is based on a security posture of the respective mobile electronic device, a privacy posture of the respective mobile electronic device, or a combination thereof. A signal representative of the calculated D2D connectability score for each of the plurality of mobile electronic devices is generated.
    Type: Grant
    Filed: July 3, 2019
    Date of Patent: November 10, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gandhi Sivakumar, Sandeep R. Patil, Sasikanth Eda, Abhishek Jain
  • Patent number: 10831714
    Abstract: A computer-implemented method, according to one embodiment, includes: sending management data to a designated common cell in a namespace of a central storage location from one or more remote storage locations. The management data corresponds to object data stored at the one or more remote storage locations. the object data stored at each of the one or more remote storage locations is further transferred to a respective cell in the namespace of the central storage location. Moreover, a modified consistency hashing algorithm configuration is implemented. The modified consistency hashing algorithm configuration routes updates of existing object data in the one or more remote storage locations to the respective cells in the central storage location. Other systems, methods, and computer program products are described in additional embodiments.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sasikanth Eda, Sanjay Vipin Gandhi, Dean Hildebrand, Trishali Satish Nayar, Brian Nelson, William W. Owen, Sandeep Ramesh Patil, Smita J. Raut
  • Patent number: 10831439
    Abstract: Embodiments are disclosed for reducing audio syndrome content. The techniques include generating a listener profile. The listener profile includes data associated with content that induces an audio syndrome for a listener. The techniques include determining that current content includes content that induces the audio syndrome for the listener. A trained audio syndrome predictor makes the determination based on the listener profile. The techniques include, in response to determining that the current content includes the content that induces the audio syndrome for the listener, generating an alternative audio content that suppresses audibility of the content that induces the audio syndrome for the listener. Additionally, the techniques include presenting the alternative audio content for the listener in place of the current content.
    Type: Grant
    Filed: July 16, 2019
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sandeep Naik, Sasikanth Eda, Deepak Ghuge, Manojkiran Eda
  • Patent number: 10832728
    Abstract: Systems for location selection based on adjacent location errors are provided. One system includes a monitor module that monitors write numbers for one or more locations on a storage device, wherein a write number in the write numbers describes a number of times a storage device operation has been performed at a location in the one or more locations. Additionally, the system includes an identification module that identifies locations in one or more locations that are susceptible to adjacent location errors, wherein an adjacent location error is an error caused by a storage device operation associated with an adjacent location. Also, the system includes a selection module that selects a location in one or more locations for storing data based on monitored write numbers and identified locations.
    Type: Grant
    Filed: April 5, 2018
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sasikanth Eda, Deepak Ghuge, Poornima Gupte, Sukumar Vankadhara
  • Patent number: 10785227
    Abstract: A computer-implemented method according to one embodiment includes receiving a request to share predetermined data with a device, identifying the predetermined data as sensitive, calculating a current security level for the device, and conditionally sharing the predetermined data with the device, based on the current security level for the device.
    Type: Grant
    Filed: January 4, 2017
    Date of Patent: September 22, 2020
    Assignee: International Business Machines Corporation
    Inventors: Duane M. Baldwin, Sasikanth Eda, Sandeep R. Patil, Sachin C. Punadikar
  • Patent number: 10764328
    Abstract: An encrypted link is established with multiple ciphers. During a handshake protocol when establishing a secure session, at least two sets of cipher suites are transmitted to a server by a client. A choice cipher suite for each set of the at least two sets of cipher suites are received by the client from the server. The client selects a first choice cipher suite from among the choice cipher suites received from the server. The client establishes a connection with the server using the first choice cipher suite to encrypt the connection.
    Type: Grant
    Filed: November 3, 2017
    Date of Patent: September 1, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sachin C. Punadikar, Pushkaraj B. Thorat, Sasikanth Eda, Sandeep R. Patil
  • Patent number: 10747458
    Abstract: Embodiments for managing data storage by one or more processors are described. An object is created with deduplicated content. A lookup is created, which includes a name of the object and at least one of an address location of the deduplicated content and a byte range of the deduplicated content. The object and the lookup are transferred from a first computing system to a second computing system.
    Type: Grant
    Filed: November 21, 2017
    Date of Patent: August 18, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sasikanth Eda, Anbazhagan Mani, Sandeep Patil, Smita J. Raut
  • Patent number: 10740288
    Abstract: Accessing objects in an erasure code supported object storage environment including receiving, from a requesting entity, a read request for an object stored in the object storage environment; identifying, using a placement data structure, an object fragment location of a first object fragment of the object; calculating, based on a filesystem root inode number and the object fragment location, a first inode address for the first object fragment of the object, wherein the first inode address identifies a location on a first storage node; reading, using the first inode address, the first object fragment and an inode structure, wherein the inode structure for the first inode address comprises a second inode address for a second object fragment of the object; reading the second object fragment using the second inode address, wherein the second inode address identifies a location on a second storage node; and providing, to the requesting entity, a reconstructed object comprising the first object fragment and the se
    Type: Grant
    Filed: December 2, 2016
    Date of Patent: August 11, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sasikanth Eda, Rezaul S. Islam, John T. Olson, Sandeep R. Patil
  • Publication number: 20200252510
    Abstract: Provided are a computer program product, system, and method for classifying a digital speech sample of a call to determine routing for the call. A digital speech sample of a call agent is processed to categorize speech as having an agent speech attribute. Information is received on a caller speech attribute initiating a call to the call center. The caller speech attribute results from categorizing a caller digital speech sample of the caller as having the caller speech attribute. A call agent of call agents having a call agent speech attribute that matches the caller speech attribute is selected and the call is routed to the selected call agent to process the call.
    Type: Application
    Filed: February 5, 2019
    Publication date: August 6, 2020
    Inventors: Deepak Ghuge, Sasikanth Eda, Manojkiran Eda
  • Patent number: 10725971
    Abstract: A computer-implemented method, according to one embodiment, includes: dividing a namespace in a central storage location into more than one cell. A first of the more than one cell is a common cell, which is configured to store management data received from remote storage locations coupled to the central storage location. Each of the remaining cells are configured to store object data received from a respective one of the remote storage locations. Management data received from the remote storage locations is stored in the common cell of the central storage location. Object data is also received, where the object data corresponds to the management data received from the remote storage locations. Furthermore, the received object data is stored in the respective cells of the central storage location. Other systems, methods, and computer program products are described in additional embodiments.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: July 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sasikanth Eda, Sanjay Vipin Gandhi, Dean Hildebrand, Trishali Satish Nayar, Brian Nelson, William W. Owen, Sandeep Ramesh Patil, Smita J. Raut
  • Publication number: 20200236195
    Abstract: A system and method dynamically transitions the file system role of compute nodes in a distributed clustered file system for an object that includes an embedded compute engine (a storlet). Embodiments of the invention overcome prior art problems of a storlet in a distributed storage system with a storlet engine having a dynamic role module which dynamically assigns or changes a file system role served by the node to a role which is more optimally suited for a computation operation in the storlet. The role assignment is made based on a classification of the computation operation and the appropriate filesystem role that matches computation operation. For example, a role could be assigned which helps reduce storage needs, communication resources, etc.
    Type: Application
    Filed: February 25, 2020
    Publication date: July 23, 2020
    Inventors: Duane M. Baldwin, Sasikanth Eda, John T. Olson, Sandeep R. Patil
  • Publication number: 20200236141
    Abstract: For migrating data to a remote data repository based on the security protocol capabilities of the remote data repository, a storage module identifies a security profile of a file residing in an on-premise data repository, where the security profile comprises security protocol requirements, matches the identified security profile with an entry in a list of one or more remote data repository providers, each entry comprising a security protocol capability of a corresponding remote data repository provider, and migrates, in response to finding a match of the identified security profile and the identified security protocol capability, the file to the matched remote data repository provider.
    Type: Application
    Filed: January 22, 2019
    Publication date: July 23, 2020
    Inventors: Sachin C. Punadikar, Sasikanth Eda, Anbazhagan Mani, Chhavi Agarwal, Archana Ravindar
  • Publication number: 20200218464
    Abstract: A computer-implemented method, according to one embodiment, includes: receiving one or more suggestions which correspond to placement of data in storage, where the one or more suggestions are based on data workload characteristics. The one or more suggestions are used to identify portions of actual data stored in actual storage which correspond to the one or more suggestions. For each of the identified portions of the actual data stored in the first tier, the one or more suggestions is further used to determine whether to transfer the given identified portion of the actual data to the second tier. Moreover, in response to determining to transfer at least one of the identified portions of the actual data to the second tier, one or more instructions are sent to transfer the at least one of the identified portions of the actual data from the first tier to the second tier.
    Type: Application
    Filed: January 8, 2019
    Publication date: July 9, 2020
    Inventors: Sandeep R. Patil, Sasikanth Eda, Abhishek Jain, Digvijay Ukirde
  • Patent number: 10708340
    Abstract: Embodiments for managing data transfers by one or more processors are described. A signal is caused to be sent between a first computing system and a second computing system. Data is stored on at least one of the first computing system and the second computing system. During at least one first portion of the signal, information associated with the storage of the data on the at least one of the first computing system and the second computing system is transferred between the first computing system and the second computing system. During at least one second portion of the signal, at least some of the data is transferred between the first computing system and the second computing system.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: July 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sasikanth Eda, Akshat Mithal, Sandeep Patil
  • Patent number: 10698862
    Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a snapshot utility for generating a snapshot of an erasure coded object in an object storage environment. Responsive to receiving a request to generate a snapshot of an erasure coded (EC) object in a filesystem in the object storage environment, the snapshot utility obtains a list of EC fragments from a proxy layer of the object storage environment. The snapshot utility copies a number of the EC fragments to generate the snapshot of the EC object.
    Type: Grant
    Filed: April 13, 2017
    Date of Patent: June 30, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sasikanth Eda, Sandeep R. Patil, Sachin C. Punadikar, Sanjay K. Sudam
  • Patent number: 10694435
    Abstract: A computer-implemented method, according to one embodiment, includes: receiving, by the computer, information. The information that is received includes: an expiry time which corresponds to a communication request, and communication resources associated with the communication request. The communication resources further include a channel and/or a spectrum band which correspond to the communication request. The expiry time is packaged with the communication resources by the computer. Furthermore, the packaged expiry time and communication resources is passed, by the computer, to devices which correspond to each of one or more identities associated with the communication request. Other systems, methods, and computer program products are described in additional embodiments.
    Type: Grant
    Filed: March 14, 2019
    Date of Patent: June 23, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gandhi Sivakumar, Rajan Dilavar Mithani, Sandeep R. Patil, Sasikanth Eda, Abhishek Jain
  • Publication number: 20200193238
    Abstract: A computer-implemented method according to one embodiment includes classifying an image stored on a device as a type of image. A user's access pattern of other images also classified as the type of image is analyzed. The method further includes analyzing at least one sharing medium that the user has previously used to share the image and/or other images. The analyzing the at least one medium is at least in part based on the classified type of the image. A previously recorded delete pattern of the user is analyzed. The analyzing the previously recorded delete pattern of the user is at least in part based on the classified type of the image. Based on the classified type of the image and/or based on results of the analyses, the image is categorized to one of a plurality of image compression categories. Each category corresponds to a degree of image compression.
    Type: Application
    Filed: December 12, 2018
    Publication date: June 18, 2020
    Inventors: Deepak Ghuge, Abhishek Jain, Subhojit Roy, Sasikanth Eda, Manojkiran Eda
  • Patent number: 10681180
    Abstract: A system and method dynamically transitions the file system role of compute nodes in a distributed clustered file system for an object that includes an embedded compute engine (a storlet). Embodiments of the invention overcome prior art problems of a storlet in a distributed storage system with a storlet engine having a dynamic role module which dynamically assigns or changes a file system role served by the node to a role which is more optimally suited for a computation operation in the storlet. The role assignment is made based on a classification of the computation operation and the appropriate filesystem role that matches computation operation. For example, a role could be assigned which helps reduce storage needs, communication resources, etc.
    Type: Grant
    Filed: March 16, 2019
    Date of Patent: June 9, 2020
    Assignee: International Business Machines Corporation
    Inventors: Duane M. Baldwin, Sasikanth Eda, John T. Olson, Sandeep R. Patil
  • Publication number: 20200174692
    Abstract: A computer-implemented method, according to one embodiment, includes: selecting two previously captured snapshots and calculating a checksum for each file in each of the two snapshots. The checksums are used to determine whether the two snapshots are sufficiently similar to each other. In response to determining that the two snapshots are sufficiently similar to each other, important ones of the files in each of the two snapshots are identified. The identified important files which are located in a lower performance tier of a multi-tier data storage system are transitioned to a higher performance tier of the multi-tier data storage system. Moreover, a merged snapshot is created by merging the two snapshots, and the merged snapshot is provided for additional operations. Other systems, methods, and computer program products are described in additional embodiments.
    Type: Application
    Filed: December 4, 2018
    Publication date: June 4, 2020
    Inventors: Abhishek S. Dave, Shailesh S. Jeurkar, Sandeep R. Patil, Sasikanth Eda