Patents by Inventor Shamik Kacker

Shamik Kacker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250045416
    Abstract: One example method includes pre-processing a dataset, wherein the dataset includes data and/or metadata that indicates a software configuration of an internet of things (IoT) device, and/or indicates a history of any performance issues and/or security issues experienced by the IoT device, after the dataset is pre-processed, providing the dataset as an input to a machine learning model, using the machine learning model to generate, based on the input, respective target variable value predictions for each target variable in a group of target variables, and a first one of the target variables corresponds to the software configuration, and a second one of the target variables corresponds to the history, and when the target variable value predictions indicate a potential security issue and/or a potential performance issue, with the IoT device, taking a remedial action to resolve the potential security issue and/or the potential performance issue.
    Type: Application
    Filed: August 4, 2023
    Publication date: February 6, 2025
    Inventors: Shamik Kacker, Bijan Kumar Mohanty, Hung Dinh
  • Publication number: 20250045103
    Abstract: One example method includes receiving, by a workspace size predicting engine, a workspace provisioning request including resource requirement information that specifies one or more features that are to be included when a workspace is provisioned. The one or more features include at least a machine learning (ML) model that is to be run in the workspace. The method also includes predicting, by the workspace size predicting engine, the one or more resources for provisioning the workspace that corresponds to the workspace provisioning request.
    Type: Application
    Filed: August 4, 2023
    Publication date: February 6, 2025
    Inventors: Shamik Kacker, Bijan Kumar Mohanty, Hung Dinh, Thiagarajan Ramakrishnan
  • Publication number: 20250045119
    Abstract: One example method includes receiving, by a workspace size predicting engine, a workspace provisioning request regarding a customer machine learning (ML) model, predicting, by the workspace size predicting engine, a size of a workspace that corresponds to the workspace provisioning request, receiving, by a datacenter host prediction engine from the workspace size predicting engine, the workspace size, and predicting, by the datacenter host prediction engine, a datacenter and/or host that is able to support requirements of the workspace.
    Type: Application
    Filed: August 4, 2023
    Publication date: February 6, 2025
    Inventors: Shamik Kacker, Bijan Kumar Mohanty, Hung Dinh, Thiagarajan Ramakrishnan
  • Publication number: 20250045451
    Abstract: One example method includes automatically scanning, at a privacy data collector, received data to determine if the received data is related to an Artificial Intelligence (AI)/Machine Learning (ML) workspace that is used to build an ML model. For the received data that is determined to be related to the AI/ML workspace, parsing the data, by the privacy data collector, to determine if the data includes any Personal Identifiable Information (PII) or other sensitive information. For the data that includes PII data or other sensitive data, generating, by a ML classification model, a privacy classification for the data. For the classified data, performing, by a data masking component, a data masking operation on the PII data or other sensitive data to generate masked data.
    Type: Application
    Filed: August 4, 2023
    Publication date: February 6, 2025
    Inventors: Thiagarajan Ramakrishnan, Leandro Machado Lopes, Shamik Kacker
  • Publication number: 20240378298
    Abstract: An example methodology includes, by a computing device, receiving information regarding a new application from another computing device and determining one or more relevant features from the information regarding the new application, the one or more relevant features influencing predictions of any potential performance issue and any potential security issue. The method also includes, by the computing device, generating, using a multi-target machine learning (ML) model, a first prediction of any potential performance issue for the new application and a second prediction of any potential security issue for the new application based on the determined one or more relevant features, and sending the first and second predictions to the another computing device.
    Type: Application
    Filed: May 10, 2023
    Publication date: November 14, 2024
    Applicant: Dell Products L.P.
    Inventors: Shamik Kacker, Bijan Kumar Mohanty, Hung Dinh
  • Patent number: 12101230
    Abstract: In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, receiving a message for delivery to a message-oriented middleware (MOM) server and determining whether an anomaly is predicted in the MOM server. The method also includes, by the computing device, responsive to a determination that an anomaly is predicted in the MOM server, identifying an alternate MOM server for delivery of the message, and routing the message to the alternate MOM server. The method may also include, by the computing device, responsive to a determination that an anomaly is not predicted in the MOM server, delivering the message to the MOM server.
    Type: Grant
    Filed: December 5, 2022
    Date of Patent: September 24, 2024
    Assignee: Dell Products L.P.
    Inventors: Bijan Kumar Mohanty, Shamik Kacker, Hung Dinh
  • Publication number: 20240265130
    Abstract: In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, receiving a data access event, wherein the data access event relates to a data element and determining whether the data element is a personally identifiable information (PII) data element. The method also includes, responsive to a determination that the data element is a PII data element, by the computing device, predicting, using a machine learning (ML) model, a PII protection policy appropriate for the PII data element, and applying the PII protection policy to the PII data element. The method further includes, by the computing device, returning the data access event including the PII data element with the PII protection policy applied.
    Type: Application
    Filed: February 8, 2023
    Publication date: August 8, 2024
    Applicant: Dell Products L.P.
    Inventors: Shamik Kacker, Bijan Kumar Mohanty, Hung Dinh
  • Publication number: 20240187309
    Abstract: In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, receiving a message for delivery to a message-oriented middleware (MOM) server and determining whether an anomaly is predicted in the MOM server. The method also includes, by the computing device, responsive to a determination that an anomaly is predicted in the MOM server, identifying an alternate MOM server for delivery of the message, and routing the message to the alternate MOM server. The method may also include, by the computing device, responsive to a determination that an anomaly is not predicted in the MOM server, delivering the message to the MOM server.
    Type: Application
    Filed: December 5, 2022
    Publication date: June 6, 2024
    Applicant: Dell Products L.P.
    Inventors: Bijan Kumar MOHANTY, Shamik KACKER, Hung DINH
  • Publication number: 20240163306
    Abstract: Architectures and techniques are described that can automate container security elements in the context of applications being deployed on a container orchestration platform. Techniques detailed herein can serve to increase awareness of container product security in an automated manner, can automate processes on detecting security vulnerabilities and bringing down insecure workspaces, can automate processes for mitigating the security vulnerabilities, notifying, verifying, and bringing the associated containers back online.
    Type: Application
    Filed: November 16, 2022
    Publication date: May 16, 2024
    Inventors: Thiagarajan Ramakrishnan, Shamik Kacker, Leandro Lopes
  • Publication number: 20240152745
    Abstract: A method comprises receiving event-based data, extracting one or more attributes from the event-based data, and analyzing the one or more attributes to classify whether the one or more attributes comprise personally identifiable information. The analyzing is performed using one or more machine learning models. The event-based data corresponds to one or more events where the one or more attributes are added to at least one of a database and an application.
    Type: Application
    Filed: November 4, 2022
    Publication date: May 9, 2024
    Inventors: Bijan Kumar Mohanty, Barun Pandey, Shamik Kacker, Hung Dinh