Patents by Inventor Shailendra Moyal
Shailendra Moyal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210208993Abstract: Provided are techniques for cognitive and deep learning-based component distribution. In response to receiving cognitive data from a plurality of workstations, the cognitive data is stored as global cognitive data. A plurality of cognitive usage keys are generated using the global cognitive data, where each cognitive usage key of the plurality of cognitive usage keys is generated for each end user and each software component. Usage insights are generated using the plurality of cognitive usage keys, where each of the usage insights describes a software component and indicates whether the software component increases productivity of one or more end users. Licenses available for each software component described in the usage insights are determined. Based on the usage insights and the licenses available for the software components, the software components and the licenses for the software components are redistributed.Type: ApplicationFiled: January 6, 2020Publication date: July 8, 2021Inventors: Shailendra Moyal, Venkata Vara Prasad Karri
-
Publication number: 20210133270Abstract: Aspects of the present invention disclose a method, computer program product, and system for determining a presentation of URLs within a hyperlink. The method includes one or more processors determining information associated with a user accessing a document, wherein the document includes a hyperlink that is associated with a plurality of uniform resource locators (URLs). The method further includes one or more processors identifying, that the user selects the hyperlink within the document. The method further includes one or more processors determining a presentation of one of more URLs of the plurality of URLs of the hyperlink for the user based on the determined information associated with the user.Type: ApplicationFiled: November 5, 2019Publication date: May 6, 2021Inventors: Shailendra Moyal, Akash U. Dhoot, Nitin Sampatrao Jadhav, Venkata Vara Prasad Karri
-
Publication number: 20210042342Abstract: A method, apparatus, system, and computer program product for processing electronic resumes. Classifications are identified for sections in the electronic resume. Resume classification codes are associated with the sections based on the classifications identified, wherein the resume classification codes enable matching the electronic resume to a job opening. Visibility codes are generated for the sections. The visibility codes enable selective viewing of the sections.Type: ApplicationFiled: August 9, 2019Publication date: February 11, 2021Inventors: Venkata Vara Prasad Karri, Shailendra Moyal, Amit Kumar Senapaty, Akash U. Dhoot
-
Patent number: 10713349Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: GrantFiled: May 29, 2018Date of Patent: July 14, 2020Assignee: International Business Machines CorporationInventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Publication number: 20200104217Abstract: A method, system and computer program product for achieving activity centric computing. An activity (e.g., opening an application, opening an electronic communication, initiating a printing action, initiating a browsing session) performed by a user on a computing device is detected. In response to detecting the activity, the runtime environment is captured and the session workflow associated with the detected activity is recorded. The session workflow refers to the events performed by the user on the computing device in connection with performing an activity (e.g., application usage, web browsing) on the computing device. The captured runtime environment and the recorded session workflow associated with the detected activity are stored in a portable container. After receiving an indication to share the activity, an image of the container is created and stored in a repository to be shared among users to replay the session workflow associated with the activity.Type: ApplicationFiled: October 2, 2018Publication date: April 2, 2020Inventors: Nitin S. Jadhav, Shailendra Moyal, Akash U. Dhoot
-
Publication number: 20200099595Abstract: Ad hoc private localization of service instances of a global service provided via hybrid cloud computing environment. In-memory and/or container image-based provisioning of a service instance from a public cloud portion to a private cloud portion within a hybrid cloud computing environment is based on context of service usage, pattern of service usage, predicted environmental conditions, and/or subscription-based input.Type: ApplicationFiled: September 26, 2018Publication date: March 26, 2020Inventors: Shailendra Moyal, Akash U. Dhoot, Nitin S. Jadhav, Niteen D. Lakhe
-
Publication number: 20200081591Abstract: Provided are a computer program product, system, and method for determining content values to render in a computer user interface based on user feedback and information. Detection is made of a section of the document rendered in a computer user interface that the user is observing. A monitoring device detects user biometric data in response to detecting the section the user is observing. Input is provided to a machine learning module comprising the content value in the section the user is observing, the user biometric data, and personal information of the user. Output from the machine learning module indicates a likelihood that the user approved or disapproved of the content value in the section the user was observing. The output is used to determine whether to send a substitute content value of the plurality of content values to render in the section the user is observing.Type: ApplicationFiled: September 12, 2018Publication date: March 12, 2020Inventors: Venkata Vara Prasad Karri, Shailendra Moyal, Akash U. Dhoot
-
Patent number: 10574712Abstract: A method, executed by a computer, for provisioning chat rooms (e.g. audio, video, and/or text-based communication) includes determining a topic by accessing one or more user communities, creating a chat corresponding to the topic, selecting one or more users to invite to the chat using a template, and inviting the one or more users to the chat. A computer program product and computer system corresponding to the above method are also disclosed herein.Type: GrantFiled: February 19, 2016Date of Patent: February 25, 2020Assignee: International Business Machines CorporationInventors: Akash U. Dhoot, Shailendra Moyal, Bhavuk Srivastava
-
Publication number: 20190286794Abstract: A system and method for using blockchain for flexible application licensing are presented. A licensing token, from a pool of licensing tokens, is provided using a transactional database based on blockchain protocols for using an application. Usage of each application may be validated according to the one or more licensing tokens using the transactional database.Type: ApplicationFiled: March 19, 2018Publication date: September 19, 2019Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rojan JOSE, Brian M. ARTHUR, Akash U. DHOOT, Shailendra MOYAL, Joseph KORTING, Karan K. NAVANI
-
Patent number: 10403287Abstract: A method for identifying and managing users within a group during a teleconference. The method includes a computer processor determining that a group of users are sharing a first client device to communicate, via a teleconference with one or more other users. The method further includes identifying a first user, of the group of user that are sharing the first client device, that is speaking during a first portion of the teleconference. The method further includes determining an action corresponding to the first user, where an action affects managing content of the teleconference at a client device. The method further includes initiating the determined action corresponding to the first user.Type: GrantFiled: January 19, 2017Date of Patent: September 3, 2019Assignee: International Business Machines CorporationInventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Publication number: 20190268172Abstract: A computer implemented method for ranking devices according to compatibility with a collaboration service includes receiving a set of collaboration information and a set of device information, wherein the collaboration information includes a service through which the collaboration is available and the set of device information corresponds to one or more registered devices, determining contextual information corresponding to the collaboration, wherein the contextual information includes minimum device requirements for participation in the collaboration, calculating compatibility metrics for one or more participant devices according to the received set of device information and the determined contextual information corresponding to the collaboration, ranking the one or more registered devices according to the calculated compatibility metrics, and enabling a device to access the collaboration according to the device rankings.Type: ApplicationFiled: May 13, 2019Publication date: August 29, 2019Inventors: Shailendra Moyal, Akash U. Dhoot, Nitin S. Jadhav
-
Publication number: 20190116055Abstract: A computer implemented method for ranking devices according to compatibility with a collaboration service includes receiving a set of collaboration information and a set of device information, wherein the collaboration information includes a service through which the collaboration is available and the set of device information corresponds to one or more registered devices, determining contextual information corresponding to the collaboration, wherein the contextual information includes minimum device requirements for participation in the collaboration, calculating compatibility metrics for one or more participant devices according to the received set of device information and the determined contextual information corresponding to the collaboration, ranking the one or more registered devices according to the calculated compatibility metrics, and enabling a device to access the collaboration according to the device rankings.Type: ApplicationFiled: October 12, 2017Publication date: April 18, 2019Inventors: Shailendra Moyal, Akash U. Dhoot, Nitin S. Jadhav
-
Publication number: 20190102737Abstract: Embodiments for receiving feedback from individuals by one or more processors are described. A score associated with a mental state of at least one individual regarding responding to an inquiry is determined. If the determined score is below a predetermined threshold, a signal indicative of a recommended communication with the at least one individual is generated.Type: ApplicationFiled: October 3, 2017Publication date: April 4, 2019Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Arpita G. GUDIHAL, Shailendra MOYAL
-
Patent number: 10204218Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: GrantFiled: May 8, 2018Date of Patent: February 12, 2019Assignee: International Business Machines CorporationInventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Patent number: 10198571Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: GrantFiled: May 8, 2018Date of Patent: February 5, 2019Assignee: International Business Machines CorporationInventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Patent number: 10165018Abstract: A method, computer program product, and computer system for identifying a plurality of participants in a multi-user collaboration session connected via at least one common computing device. It may be determined that a first client device in the collaboration session is more active with a second client device in the collaboration session than with a third client device in the collaboration session. A failure may be detected of the at least one common computing device connecting the multi-user collaboration session. The multi-user collaboration session may be converted to a point to point connection between the first client device and the second client device based upon, at least in part, determining that the first client device in the collaboration session is more active with the second client device in the collaboration session than with the third client device in the collaboration session.Type: GrantFiled: November 21, 2017Date of Patent: December 25, 2018Assignee: International Business Machines CorporationInventors: Animesh Gupta, Shailendra Moyal, Ishan Rastogi
-
Patent number: 10148707Abstract: A method, computer program product, and computer system for identifying a plurality of participants in a multi-user collaboration session connected via at least one common computing device. It may be determined that a first client device in the collaboration session is more active with a second client device in the collaboration session than with a third client device in the collaboration session. A failure may be detected of the at least one common computing device connecting the multi-user collaboration session. The multi-user collaboration session may be converted to a point to point connection between the first client device and the second client device based upon, at least in part, determining that the first client device in the collaboration session is more active with the second client device in the collaboration session than with the third client device in the collaboration session.Type: GrantFiled: September 19, 2016Date of Patent: December 4, 2018Assignee: International Business Machines CorporationInventors: Animesh Gupta, Shailendra Moyal, Ishan Rastogi
-
Publication number: 20180276368Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: ApplicationFiled: May 29, 2018Publication date: September 27, 2018Inventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Publication number: 20180247051Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: ApplicationFiled: May 8, 2018Publication date: August 30, 2018Inventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal
-
Publication number: 20180247052Abstract: Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing asset. A second valid authentication input may be established with respect to access enablement to the computing asset. A triggering event may be detected. The first valid authentication input may be deactivated based on the triggering event. The second valid authentication input may be activated based on the triggering event. The graphical user interface may be presented which may appear to prompt for the first valid authentication input. The second valid authentication input may be received via the graphical user interface. Access enablement with respect to the computing asset may be authenticated in response to receiving the second valid authentication input.Type: ApplicationFiled: May 8, 2018Publication date: August 30, 2018Inventors: Akash U. Dhoot, Nitin S. Jadhav, Shailendra Moyal