Patents by Inventor Satishkumar Sadagopan
Satishkumar Sadagopan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240403099Abstract: An embodiment for improved estimating of end-user performance of cloud-based services. The embodiment may collect, for a target cloud-based service, a first dataset including network level metrics, and a second dataset including end-user performance data from one or more monitoring services. The embodiment may combine the collected first dataset and second dataset to generate a curated training dataset. The embodiment may train a machine learning prediction model using the curated training dataset. The embodiment may predict and estimate, using the trained machine learning prediction model, the end-user performance of the target cloud-based service for any target end-user.Type: ApplicationFiled: May 31, 2023Publication date: December 5, 2024Inventors: Dinesh C. Verma, Mudhakar Srivatsa, Gerald Coon, SATISHKUMAR SADAGOPAN, Utpal Mangla, Mathews Thomas
-
Publication number: 20240404415Abstract: The present inventive concept provides for a method of unmanned machine synchronization using robotic sensing. The method includes generating at least one physical signal in the vicinity of at least one unmanned machine. The at least one generated physical signal is received by the at least one unmanned machine. At least one task is performed by the at least one unmanned machine based on the at least one received generated physical signal.Type: ApplicationFiled: June 1, 2023Publication date: December 5, 2024Inventors: Dinesh C. Verma, Utpal Mangla, Mathews Thomas, Gerald Coon, Mudhakar Srivatsa, Satishkumar Sadagopan
-
Publication number: 20240329726Abstract: A first computational device with a first visual display and a second computational device with a second visual display are maintained, wherein the first computational device is configured to read information displayed on the second visual display, and wherein the second computational device is configured to read information displayed on the first visual display. Byte streams are exchanged bidirectionally between the first computational device and the second computational device via the information displayed on the first visual display and the information displayed on the second visual display, wherein active radio transmission between the first computational device and the second computational device is avoided.Type: ApplicationFiled: March 29, 2023Publication date: October 3, 2024Inventors: Dinesh C. VERMA, MUDHAKAR SRIVATSA, Gerald COON, Utpal MANGLA, SATISHKUMAR SADAGOPAN, Mathews Thomas
-
Publication number: 20240322915Abstract: Embodiments are related to improving the bandwidth of classical networks using quantum networks. Sender equipment transfers quantum bits over a quantum communications network to receiver equipment, the quantum bits being used to obtain entry values in a shared dictionary. The sender equipment determines a solution for an optimization problem using the entry values, where data to be transferred over a telecommunications network is expressed by the optimization problem. The sender equipment transfers the solution over the telecommunications network to the receiver equipment, where an equivalence of the data is transferred to the receiver equipment in response to the receiver equipment using the solution, the optimization problem, and the entry values to obtain the data.Type: ApplicationFiled: March 20, 2023Publication date: September 26, 2024Inventors: Dinesh C. Verma, Gerald Coon, Satishkumar Sadagopan, Mudhakar Srivatsa, Mathews Thomas, Utpal Mangla, Paridhi Verma, Mark B. Ritter
-
Publication number: 20240320531Abstract: A computer-implemented method, according to one approach, includes receiving at least one set of qubits at a first client component, and using the at least one set of qubits to index a configuration dictionary to determine a first configuration. The configuration dictionary defines a plurality of different configurations. The method further includes causing the first client component to be configured according to the first configuration. A computer program product, according to another approach, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a first client component to cause the first client component to perform the foregoing method. A system, according to another approach, includes a processor, and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.Type: ApplicationFiled: March 24, 2023Publication date: September 26, 2024Inventors: Utpal Mangla, Paridhi Verma, Gerald Coon, Satishkumar Sadagopan, Mark B. Ritter, Mudhakar Srivatsa, Mathews Thomas, Dinesh C. Verma
-
Publication number: 20240323230Abstract: A method, computer program product and system are provided to provide control mechanisms in unidirectional data transfers. A processor connects to a secure device via a unidirectional connection. A processor sends a packet to the secure device via the unidirectional connection. A processor receives, from the secure device via a passive out-of-band channel, feedback regarding the transmission of the packet. A processor, in response to the feedback indicating that the packet was incorrectly received, resends the packet via the unidirectional connection with the secure device.Type: ApplicationFiled: March 24, 2023Publication date: September 26, 2024Inventors: Dinesh C. Verma, Mathews Thomas, SATISHKUMAR SADAGOPAN, Gerald Coon
-
Patent number: 12081385Abstract: A method for determining a correlation of one or more events occurring in a plurality of nodes of a network includes accessing, by a computing device, address information associated with each of the plurality of nodes on the network. The computing device can further access one or more event IDs associated with one or more events occurring on the plurality of nodes. The computing device can further create an association the one or more events occurring on the plurality of nodes with related events occurring on others of the plurality of nodes, the association including the address information.Type: GrantFiled: October 14, 2022Date of Patent: September 3, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mudhakar Srivatsa, Jonathan Ian Settle, Satishkumar Sadagopan, Mathews Thomas, Utpal Mangla
-
Publication number: 20240267388Abstract: A computer-implemented method, according to one embodiment, includes determining whether a predetermined sequence of knocks has been performed by a requesting node to other nodes of a network along existing paths between the requesting node and the other nodes. In response to a determination that the predetermined sequence of knocks has been performed, a connection is established between the requesting node and a first of the other nodes. A computer program product, according to another embodiment, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method. A system, according to another embodiment, includes a processor, and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.Type: ApplicationFiled: February 2, 2023Publication date: August 8, 2024Inventors: Mudhakar Srivatsa, Satishkumar Sadagopan, Mathews Thomas, Utpal Mangla, Gerald Coon, Dinesh C. Verma
-
Publication number: 20240248831Abstract: Computer-implemented methods for repairing a software of a computing system are provided. Aspects include receiving a request to diagnose the software, the software including a plurality of software components configured to communicate with each other via application programing interfaces and creating a representation of the software in a virtual reality environment. Aspects also include identifying an error in the software based on error logs generated by the software and identifying one or more of the plurality of software components and the application programing interfaces that correspond to the error. Aspects further include displaying a visual indication of the error in the virtual reality environment, wherein the visual indication is determined based on a type of the error, receiving, via the virtual reality environment, a corrective action from a user, and performing a task in the software based on the corrective action, wherein the task is configured to address the error.Type: ApplicationFiled: January 23, 2023Publication date: July 25, 2024Inventors: Dinesh C. Verma, SATISHKUMAR SADAGOPAN, Gerald Coon, MUDHAKAR SRIVATSA
-
Publication number: 20240236124Abstract: Embodiments related to using a foundational model for network packet traces. A technique includes receiving network traffic of a network and extracting features from the network traffic, the features having a function related to communications in the network. The technique includes generating tokens from the features, each of the features corresponding to a respective one of the tokens, training a machine learning model by inputting the tokens, the machine learning model being trained to output contextual embeddings for the tokens, and using the contextual embeddings to determine an anomaly in the network traffic.Type: ApplicationFiled: October 20, 2022Publication date: July 11, 2024Inventors: MUDHAKAR SRIVATSA, Davis Wertheimer, Franck Vinh Le, Utpal Mangla, SATISHKUMAR SADAGOPAN, Mathews Thomas, Dinesh C. Verma
-
Publication number: 20240202552Abstract: A computer-implemented method, according to one embodiment, includes determining a plurality of downstream task models of a foundation model, and arranging the downstream task models into a logical tree structure. Each node of the logical tree structure represents a sequence of layers of an associated one of the downstream task models. In response to a determination that a request for inferencing on a target model has resulted in a cache miss occurring, the logical tree structure is used to identify an inferencing server that satisfies at least a first predetermined prerequisite for fulfilling the inferencing request. The method further includes causing the identified inferencing server to fulfill the inferencing request. A computer program product, according to one embodiment, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method.Type: ApplicationFiled: December 16, 2022Publication date: June 20, 2024Inventors: Mudhakar Srivatsa, Satishkumar Sadagopan, Utpal Mangla, Dinesh C. Verma, Gerald Coon, Mathews Thomas
-
Publication number: 20240146693Abstract: A method, computer system, and a computer program product is provided for establishing a dynamically adaptive network firewall. A firewall model is established that identifies resources that can be used and a plurality of nodes that connect to one another to form a network. A set of external rules and policies are provided to each resource. The firewall implemented using the firewall model upon receiving of incoming data and upon traffic flow. The firewall expands or contracts the network by adding or removing resources according to work that needs to be performed. The work includes both tasks to be completed and efforts that has to be taken by the firewall to ensure security by preventing unauthorized access into the network.Type: ApplicationFiled: October 28, 2022Publication date: May 2, 2024Inventors: SATISHKUMAR SADAGOPAN, MUDHAKAR SRIVATSA, Dinesh C. Verma, Mathews Thomas, Utpal Mangla, Gerald Coon
-
Publication number: 20240137375Abstract: Embodiments related to using a foundational model for network packet traces. A technique includes receiving network traffic of a network and extracting features from the network traffic, the features having a function related to communications in the network. The technique includes generating tokens from the features, each of the features corresponding to a respective one of the tokens, training a machine learning model by inputting the tokens, the machine learning model being trained to output contextual embeddings for the tokens, and using the contextual embeddings to determine an anomaly in the network traffic.Type: ApplicationFiled: October 19, 2022Publication date: April 25, 2024Inventors: MUDHAKAR SRIVATSA, Davis Wertheimer, Franck Vinh Le, Utpal Mangla, SATISHKUMAR SADAGOPAN, Mathews Thomas, Dinesh C. Verma
-
Publication number: 20240129178Abstract: A method for determining a correlation of one or more events occurring in a plurality of nodes of a network includes accessing, by a computing device, address information associated with each of the plurality of nodes on the network. The computing device can further access one or more event IDs associated with one or more events occurring on the plurality of nodes. The computing device can further create an association the one or more events occurring on the plurality of nodes with related events occurring on others of the plurality of nodes, the association including the address information.Type: ApplicationFiled: October 14, 2022Publication date: April 18, 2024Inventors: Mudhakar Srivatsa, Jonathan Ian Settle, Satishkumar Sadagopan, Mathews Thomas, Utpal Mangla
-
Patent number: 11954085Abstract: A computer implemented method performs data skipping in a hierarchically organized computing system. A group of processor units determines leaf node data sketches for data in leaf nodes in the hierarchically organized computing system. The leaf node data sketches summarize attributes of data in the leaf nodes. The group of processor units aggregates the leaf node data sketches at intermediate nodes in the hierarchically organized computing system to form aggregated data sketches at the intermediate nodes and retains data sketches received at the intermediate nodes from a group of child nodes to form retained data sketches. The retained data sketches are one of leaf node data sketches and the aggregated data sketches. The group of processor units searches the data using the retained data sketches and the data skipping within the hierarchically organized computing system in response to queries made to the intermediate nodes in the hierarchically organized computing system.Type: GrantFiled: September 22, 2022Date of Patent: April 9, 2024Assignee: International Business Machines CorporationInventors: Mudhakar Srivatsa, Raghu Kiran Ganti, Joshua M. Rosenkranz, Linsong Chu, Tuan Minh Hoang Trong, Utpal Mangla, Satishkumar Sadagopan, Mathews Thomas
-
Publication number: 20240104075Abstract: A computer implemented method performs data skipping in a hierarchically organized computing system. A group of processor units determines leaf node data sketches for data in leaf nodes in the hierarchically organized computing system. The leaf node data sketches summarize attributes of data in the leaf nodes. The group of processor units aggregates the leaf node data sketches at intermediate nodes in the hierarchically organized computing system to form aggregated data sketches at the intermediate nodes and retains data sketches received at the intermediate nodes from a group of child nodes to form retained data sketches. The retained data sketches are one of leaf node data sketches and the aggregated data sketches. The group of processor units searches the data using the retained data sketches and the data skipping within the hierarchically organized computing system in response to queries made to the intermediate nodes in the hierarchically organized computing system.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Inventors: MUDHAKAR SRIVATSA, RAGHU KIRAN GANTI, Joshua M. Rosenkranz, Linsong Chu, Tuan Minh HOANG TRONG, Utpal Mangla, SATISHKUMAR SADAGOPAN, Mathews Thomas
-
Patent number: 8015278Abstract: Systems and methods are provided for monitoring events impacting service in a network communications system. One embodiment includes monitoring an event data structure for one or more events. The events are based on faulty network components in the communications system. One or more tickets based on the events are created. The tickets may be used to address the events. Further, creating one or more lists of network components impacted by the events, and, based on the lists of impacted network components, correlating the tickets one to another. Finally, based on the correlation, updating the events in the event data structure.Type: GrantFiled: October 26, 2004Date of Patent: September 6, 2011Assignee: Sprint Communications Company L.P.Inventors: Nicolita Papa, Satishkumar Sadagopan
-
Patent number: 7986639Abstract: System and methods are provided for creating a topology of a communications network. One embodiment includes receiving a first instance of topology information at one or more integration sources and determining if the first instance of topology information includes a portion of topology information on a span of the communications network by the one or more integration sources. If the first instance of topology information only includes the portion of topology information, then receiving, at the one or more integration sources a second instance of topology information, and supplementing the first instance with the second instance of topology information to form complete topology information of the span of the communications network by the one or more integration sources and transferring the complete topology information to a topology data structure.Type: GrantFiled: October 26, 2004Date of Patent: July 26, 2011Assignee: Sprint Communications Company L.P.Inventors: Satishkumar Sadagopan, Richard Charles Ahlstrom, Joseph Iosif Freydlin, Clifford Todd Allen
-
Patent number: 7796500Abstract: Systems and methods are provided for determining if an alarm originating from a component within a communications network impacts service of said network. One embodiment includes scanning a first data structure for faulty network components which may potentially affect network service, determining network components that are supported by the faulty network component, calculating a percentage of the network components indicating a fault, and determining if the percentage of the network components is above a threshold. If the percentage is above the threshold the faulty network component is determined to be service impacting. Finally, communicating to a second data structure that the faulty network component impacts service of the communications network.Type: GrantFiled: October 26, 2004Date of Patent: September 14, 2010Assignee: Sprint Communications Company L.P.Inventors: John Martin Elliott, Satishkumar Sadagopan, Perry Vance Licari
-
Patent number: 7701843Abstract: System and methods are provided for automated alarm handling in a communications network by linking network failures to impacted resources. One embodiment includes correlating one or more network failures to a common network resource in a communications network, associating each network component of the communications network one to another, where the network components include one common network resource, attributing fault data originating from one or more of the network components to an associated common network resource, and collecting in a central data structure the attributed fault data with the associated common network resource.Type: GrantFiled: October 26, 2004Date of Patent: April 20, 2010Assignee: Sprint Communications Company L.P.Inventors: Perry Vance Licari, Satishkumar Sadagopan, John Dexter Ceniza Omolon