Patents by Inventor Shajeer K. Mohammed
Shajeer K. Mohammed has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11822551Abstract: An approach is provided that receives a request to write an entry to a database. Database caches are then checked for a portion of the entry, such as a portion that includes a primary key. Based on the checking, the approach determines whether to write the entry to the database. In response to the determination being that the entry cannot be written to the database, an error is returned with the error being returned without accessing the database, only the caches. On the other hand, the entry is written to the database in response to the determination being that the entry can be written to the database.Type: GrantFiled: August 31, 2021Date of Patent: November 21, 2023Assignee: International Business Machines CorporationInventors: Hariharan Krishna, Shajeer K Mohammed, Sudheesh S. Kairali
-
Patent number: 11803485Abstract: Disclosed embodiments provide features for the architecture of microservices. A global context cache is created for a microservice environment that is accessible from multiple deployed microservices. Data from various customers/applications can be aggregated to establish a determination of when a read or write access would fail due to permissions, and/or other condition such as existence or non-existence of certain data. In such situations, an error can be returned from the global context cache in much less time than if the access request propagated throughout the computer network to the persistent storage. In this way, disclosed embodiments reduce downtime and save money for organizations, and increase the efficiency of utilization of computer resources.Type: GrantFiled: March 11, 2021Date of Patent: October 31, 2023Assignee: International Business Machines CorporationInventors: Hariharan Krishna, Shajeer K Mohammed, Sudheesh S. Kairali
-
ADJUSTING RESOURCES WITHIN A HYPERCONVERGED INFRASTRUCTURE SYSTEM BASED ON ENVIRONMENTAL INFORMATION
Publication number: 20230123303Abstract: A computer-implemented method according to one aspect includes identifying environmental information for a hyper-converged infrastructure (HCI) system; and adjusting one or more resources allocated to one or more applications within the HCI system, based on the environmental information.Type: ApplicationFiled: October 20, 2021Publication date: April 20, 2023Inventors: Sandeep Ramesh Patil, Shajeer K. Mohammed, Vinatha Chaturvedi, Yu-Cheng Hsu, Hugh Edward Hockett, Sridhar Muppidi -
Publication number: 20230079199Abstract: A computer-implemented method, according to one embodiment, includes: determining, for each pair of HCI systems where each pair includes a first HCI system coupled to another HCI system, a federation relationship setting that corresponds to each pair. The federation relationship settings are used to control a flow of data, as well as to control a flow of workload scheduling, between the first HCI system and the other HCI systems in the respective pairs. Moreover, determining a federation relationship setting that corresponds to a pair includes: determining whether a risk score which corresponds to the pair is outside a predetermined range. In response to determining that the risk score is outside the predetermined range, a restrictive federation relationship setting is assigned to the pair, and in response to determining that the risk score is not outside the predetermined range, a permissive federation relationship setting is assigned to the pair.Type: ApplicationFiled: September 14, 2021Publication date: March 16, 2023Inventors: Sandeep Ramesh Patil, Sridhar Muppidi, Yu-Cheng Hsu, Smita J. Raut, Shajeer K. Mohammed, Piyush Chaudhary
-
Publication number: 20230062388Abstract: An approach is provided that receives a request to write an entry to a database. Database caches are then checked for a portion of the entry, such as a portion that includes a primary key. Based on the checking, the approach determines whether to write the entry to the database. In response to the determination being that the entry cannot be written to the database, an error is returned with the error being returned without accessing the database, only the caches. On the other hand, the entry is written to the database in response to the determination being that the entry can be written to the database.Type: ApplicationFiled: August 31, 2021Publication date: March 2, 2023Inventors: Hariharan Krishna, Shajeer K Mohammed, Sudheesh S. Kairali
-
Patent number: 11477293Abstract: A method for migrating an application includes representing the application as a vector including metadata about the application and at least one customer constraint, scoring a deviation of data consistency for the application related to each of a plurality of clouds, including a cloud in which the application is currently deployed and a plurality of potential target clouds, selecting one of the potential target clouds based on the scoring, wherein the selected cloud has an improved score over the cloud in which the application is current deployed, and migrating the application to the selected cloud.Type: GrantFiled: February 19, 2021Date of Patent: October 18, 2022Assignee: International Business Machines CorporationInventors: Sudheesh S. Kairali, Abhinav Gupta, Abhishek Seth, Shajeer K Mohammed, Hariharan Krishna
-
Publication number: 20220292032Abstract: Disclosed embodiments provide features for the architecture of microservices. A global context cache is created for a microservice environment that is accessible from multiple deployed microservices. Data from various customers/applications can be aggregated to establish a determination of when a read or write access would fail due to permissions, and/or other condition such as existence or non-existence of certain data. In such situations, an error can be returned from the global context cache in much less time than if the access request propagated throughout the computer network to the persistent storage.Type: ApplicationFiled: March 11, 2021Publication date: September 15, 2022Inventors: Hariharan Krishna, Shajeer K Mohammed, Sudheesh S. Kairali
-
Publication number: 20220272157Abstract: A method for migrating an application includes representing the application as a vector including metadata about the application and at least one customer constraint, scoring a deviation of data consistency for the application related to each of a plurality of clouds, including a cloud in which the application is currently deployed and a plurality of potential target clouds, selecting one of the potential target clouds based on the scoring, wherein the selected cloud has an improved score over the cloud in which the application is current deployed, and migrating the application to the selected cloud.Type: ApplicationFiled: February 19, 2021Publication date: August 25, 2022Inventors: Sudheesh S. Kairali, Abhinav Gupta, Abhishek Seth, Shajeer K Mohammed, Hariharan Krishna
-
Patent number: 11252159Abstract: Dynamically enforcing access control policies unique to respective users in a multi-cluster container orchestration environment is provided. Resource-permission-role mappings are generated for users in the multi-cluster container orchestration environment based on preset access control criteria. Dynamic access control criteria are learned from the multi-cluster container orchestration environment over time. The resource-permission-role mappings for the users in the multi-cluster container orchestration environment are updated based on the dynamic access control criteria learned from the multi-cluster container orchestration environment over time. The resource-permission-role mappings are enforced to respective users in the multi-cluster container orchestration environment in response to receiving corresponding user resource access requests.Type: GrantFiled: September 18, 2019Date of Patent: February 15, 2022Assignee: International Business Machines CorporationInventors: Priya Kannan, Shajeer K. Mohammed, Kavitha Subramaniam
-
Patent number: 11074407Abstract: Embodiments are directed to a system, computer program product, and method for application of cognitive processing to a communication, and selectively transmitting the communication based on the cognitive processing. Natural language understanding (NLU) decomposes the communication to identify content and keywords. A dictionary determined to be contextually related to the communication is identified to support and enable a multi-dimensional analysis of the communication content. The communication is subject to dynamic filtering with support of the dictionary and dictionary content, and the dictionary is subject to a selective amendment based on the dynamic processing. A response is generated from the filtering, and the response is subject to selective transmission.Type: GrantFiled: March 21, 2019Date of Patent: July 27, 2021Assignee: International Business Machines CorporationInventors: Priya Kannan, Ankur Tagra, Shajeer K. Mohammed
-
Patent number: 11036936Abstract: Embodiments are directed to a system, computer program product, and method for application of cognitive processing to a communication, and selectively transmitting the communication based on the cognitive processing. Natural language understanding (NLU) decomposes the communication to identify content and keywords. A dictionary determined to be contextually related to the communication is identified to support and enable a multi-dimensional analysis of the communication content. The communication is subject to dynamic filtering with support of the dictionary and dictionary content. A response is generated from the filtering, and is subject to selective transmission.Type: GrantFiled: March 21, 2019Date of Patent: June 15, 2021Assignee: International Business Machines CorporationInventors: Priya Kannan, Ankur Tagra, Shajeer K. Mohammed
-
Publication number: 20210084048Abstract: Dynamically enforcing access control policies unique to respective users in a multi-cluster container orchestration environment is provided. Resource-permission-role mappings are generated for users in the multi-cluster container orchestration environment based on preset access control criteria. Dynamic access control criteria are learned from the multi-cluster container orchestration environment over time. The resource-permission-role mappings for the users in the multi-cluster container orchestration environment are updated based on the dynamic access control criteria learned from the multi-cluster container orchestration environment over time. The resource-permission-role mappings are enforced to respective users in the multi-cluster container orchestration environment in response to receiving corresponding user resource access requests.Type: ApplicationFiled: September 18, 2019Publication date: March 18, 2021Inventors: Priya Kannan, Shajeer K. Mohammed, Kavitha Subramaniam
-
Publication number: 20210065030Abstract: Aspects of the present invention disclose a method for regeneration of live stream data lost during an outage. The method includes one or more processors identifying a data feed of a live stream. The method further includes applying a cognitive model to the data feed of the live stream. The method further includes modifying parameters of the cognitive model based at least in part on a modified weight, wherein the cognitive model performs one or more calculations to generate the modified weight based at least in part on a set of training data of the data feed. The method further includes identifying an outage in the data feed of the live stream. The method further includes generating data corresponding to the outage in the data feed of the live stream, wherein the generated data is based at least in part on the modified weight of the set of training data.Type: ApplicationFiled: August 26, 2019Publication date: March 4, 2021Inventors: Ankur Tagra, Shajeer K. Mohammed, Abhinav Gupta, Geetika` Sahu
-
Publication number: 20200304466Abstract: Embodiments are directed to a system, computer program product, and method for application of cognitive processing to a communication, and selectively transmitting the communication based on the cognitive processing. Natural language understanding (NLU) decomposes the communication to identify content and keywords. A dictionary determined to be contextually related to the communication is identified to support and enable a multi-dimensional analysis of the communication content. The communication is subject to dynamic filtering with support of the dictionary and dictionary content. A response is generated from the filtering, and is subject to selective transmission.Type: ApplicationFiled: March 21, 2019Publication date: September 24, 2020Applicant: International Business Machines CorporationInventors: Priya Kannan, Ankur Tagra, Shajeer K. Mohammed
-
Publication number: 20200302015Abstract: Embodiments are directed to a system, computer program product, and method for application of cognitive processing to a communication, and selectively transmitting the communication based on the cognitive processing. Natural language understanding (NLU) decomposes the communication to identify content and keywords. A dictionary determined to be contextually related to the communication is identified to support and enable a multi-dimensional analysis of the communication content. The communication is subject to dynamic filtering with support of the dictionary and dictionary content, and the dictionary is subject to a selective amendment based on the dynamic processing. A response is generated from the filtering, and the response is subject to selective transmission.Type: ApplicationFiled: March 21, 2019Publication date: September 24, 2020Applicant: International Business Machines CorporationInventors: Priya Kannan, Ankur Tagra, Shajeer K. Mohammed
-
Patent number: 9727344Abstract: Methods and arrangements for automatically finding the dependency of a software product on other software products or components. From an install image or directory, a signature is found by deriving the same from a directory structure of the software. Further, a directory tree structure is built and an approximate sub-tree matching algorithm is applied to find commonalities across software products.Type: GrantFiled: August 27, 2012Date of Patent: August 8, 2017Assignee: International Business Machines CorporationInventors: Rema Ananthanarayanan, Vinatha Chaturvedi, Vijil E. Chenthamarakshan, Prasad M. Deshpande, Raghuram Krishnapuram, Shajeer K. Mohammed
-
Patent number: 9563434Abstract: Methods and arrangements for automatically finding the dependency of a software product on other software products or components. From an install image or directory, a signature is found by deriving the same from a directory structure of the software. Further, a directory tree structure is built and an approximate sub-tree matching algorithm is applied to find commonalties across software products.Type: GrantFiled: February 2, 2010Date of Patent: February 7, 2017Assignee: International Business Machines CorporationInventors: Rema Ananthanarayanan, Vinatha Chaturvedi, Vijil E. Chenthamarakshan, Prasad M. Deshpande, Raghuram Krishnapuram, Shajeer K. Mohammed
-
Patent number: 8713521Abstract: Product data pertaining to a plurality of products is gathered from a plurality of sources. Dependency information for the plurality of products is extracted from the product data. The dependency information is analyzed to determine dependencies for each product of the plurality of products. The dependencies for each product of the plurality of products are displayed to a user.Type: GrantFiled: September 2, 2009Date of Patent: April 29, 2014Assignee: International Business Machines CorporationInventors: Rema Ananthanarayanan, Vinatha Chaturvedi, Vijil E. Chenthamarakshan, Prasad M. Deshpande, Raghuram Krishnapuram, Shajeer K. Mohammed
-
Publication number: 20120323939Abstract: Methods and arrangements for automatically finding the dependency of a software product on other software products or components. From an install image or directory, a signature is found by deriving the same from a directory structure of the software. Further, a directory tree structure is built and an approximate sub-tree matching algorithm is applied to find commonalities across software products.Type: ApplicationFiled: August 27, 2012Publication date: December 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rema Ananthanarayanan, Vinatha Chaturvedi, Vijil E. Chenthamarakshan, Prasad M. Deshpande, Raghuram Krishnapuram, Shajeer K. Mohammed
-
Publication number: 20110191762Abstract: Methods and arrangements for automatically finding the dependency of a software product on other software products or components. From an install image or directory, a signature is found by deriving the same from a directory structure of the software. Further, a directory tree structure is built and an approximate sub-tree matching algorithm is applied to find commonalties across software products.Type: ApplicationFiled: February 2, 2010Publication date: August 4, 2011Applicant: International Business Machines CorporationInventors: Rema Ananthanarayanan, Vinatha Chaturvedi, Vijil E. Chenthamarakshan, Prasad M. Deshpande, Raghuram Krishnapuram, Shajeer K. Mohammed