Patents by Inventor Shibi Panikkar

Shibi Panikkar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11799629
    Abstract: An apparatus comprises a processing device configured to determine an asset identifier for an information technology asset, to encrypt the asset identifier utilizing a public key of a first homomorphic encryption key pair, and to evaluate a first homomorphic encryption function for a first homomorphically encrypted access authorization object that takes as input the encrypted asset identifier and provides as output an encrypted access authorization identifier. The processing device is also configured to decrypt the access authorization identifier utilizing a secret key of the first homomorphic encryption key pair and, responsive to validating the access authorization identifier, to evaluate additional homomorphic encryption functions for additional homomorphically encrypted access authorization objects that return encrypted access authorization information.
    Type: Grant
    Filed: October 14, 2021
    Date of Patent: October 24, 2023
    Assignee: Dell Products L.P.
    Inventor: Shibi Panikkar
  • Publication number: 20230334541
    Abstract: Computing devices with dual computing architectures for use in a subscription model are disclosed. For example, a computing device comprises a first computing architecture comprising a first set of computing resources dedicated to executing one or more first computing tasks, wherein the one or more first computing tasks are associated with a subscription-based user of the computing device. The computing device further comprises a second computing architecture comprising a second set of computing resources dedicated to executing one or more second computing tasks, wherein the one or more second computing tasks are associated with a subscription-based provider of the computing device.
    Type: Application
    Filed: April 19, 2022
    Publication date: October 19, 2023
    Inventors: Shibi Panikkar, Dhilip S. Kumar, Rohit Gosain
  • Publication number: 20230336367
    Abstract: Techniques for management of a multi-cloud computing environment are disclosed. For example, a method comprises the following steps. A node is configured to participate in a distributed ledger protocol with one or more other nodes. The node is further configured to maintain, in conjunction with the one or more other nodes, a data structure of blocks, wherein the blocks represent one or more of elements and operations associated with a multi-cloud computing environment and collectively function as a digital representation of the multi-cloud computing environment.
    Type: Application
    Filed: April 18, 2022
    Publication date: October 19, 2023
    Inventors: Shibi Panikkar, Thirumaleshwara Adyanadka Shama
  • Patent number: 11782934
    Abstract: An apparatus comprises at least one processing device configured to, in a monitoring system in which at any given time at least one monitoring node has a primary monitoring role responsible for monitoring operation of system nodes of a distributed system and other monitoring nodes have a secondary monitoring role responsible for monitoring operation of the at least one monitoring node having the primary monitoring role, identify a first monitoring node having the primary monitoring role at a current time. The processing device is also configured to determine, based at least in part on a time-based ranking of the monitoring nodes, a second monitoring node having the secondary monitoring role at the current time to transition to the primary monitoring role, and to transition the second monitoring node to the primary monitoring role at a subsequent time.
    Type: Grant
    Filed: January 11, 2022
    Date of Patent: October 10, 2023
    Assignee: Dell Products L.P.
    Inventors: Shibi Panikkar, Pratheek Veluswamy, Robert A. Lincourt, Jr., Ravi Prakash Kulkarni
  • Publication number: 20230297946
    Abstract: Automated risk management techniques in an information processing system are disclosed. For example, for a given item type obtainable from two or more sources, wherein each of the two or more sources has an aging policy associated with the item type that is different with respect to one another, the method predicts a quantity of the item type obtainable from each of the two or more sources that is at risk during a given future time period based on the aging policy of each of the two or more sources. The method then determines one or more actions to be initiated to mitigate the quantity of the item type obtainable from each of the two or more sources that is at risk during the given future time period.
    Type: Application
    Filed: March 17, 2022
    Publication date: September 21, 2023
    Inventors: Shibi Panikkar, Rohit Gosain
  • Publication number: 20230289250
    Abstract: Methods, apparatus, and processor-readable storage media for operating system for collecting and transferring usage data are provided herein. An example computer-implemented method includes: configuring two or more of a plurality of hardware components to perform a respective data collection process, wherein: the hardware components are associated with at least a first location, the configuring is performed by a system layer of an operating system installed on at least one of the plurality of hardware components, and a given one of the data collection processes collects usage data of the corresponding hardware component based on one or more characteristics of the corresponding hardware component; obtaining, by the operating system from the configured hardware components, the usage data collected by each of the data collection processes over a given time period; and uploading the obtained usage data to a datastore that is associated with at least a second location.
    Type: Application
    Filed: April 25, 2022
    Publication date: September 14, 2023
    Inventors: Shibi Panikkar, Manav Ghosh, Wallace Wei
  • Publication number: 20230236897
    Abstract: Techniques for managing containerized workloads in a container computing environment are disclosed. For example, a method comprises the following steps. In a first mode, the method learns resources and execution times needed to process incoming workloads of a first workload type and a second workload type in a set of one or more clusters in a container-based computing environment. In a second mode, based on the learning of resources and execution times in the first mode, the method determines whether a subsequent incoming workload of the second workload type can be executed by one of the set of one or more clusters or whether an additional cluster should be created to process the subsequent incoming workload and then removed after processing the subsequent incoming workload is completed.
    Type: Application
    Filed: January 23, 2022
    Publication date: July 27, 2023
    Inventors: Dhilip S. Kumar, Rohit Gosain, Shibi Panikkar
  • Publication number: 20230229511
    Abstract: Techniques for managing containerized workloads in a container computing environment are disclosed. For example, a method comprises the following steps. The method predicts a composite time delay value for initializing an instance of a containerized workload for executing a microservice within a container computing environment. The method then computes at least one target resource utilization parameter, based on the predicted composite time delay value, for use by the container computing environment.
    Type: Application
    Filed: January 20, 2022
    Publication date: July 20, 2023
    Inventor: Shibi Panikkar
  • Publication number: 20230229413
    Abstract: Automated management of software code change and deployment in an information processing system is disclosed. In one example, a method comprises the following steps. The method obtains one or more parameters specifying a software deployment following at least one code change to a set of one or more software programs. The method distinguishes first portions of the set of one or more software programs that are affected by the at least one code change from second portions of the set of one or more software programs that are unaffected by the at least one code change. The method generates at least one deployment script for causing deployment of the first portions of the set of one or more software programs without causing deployment of the second portions of the set of one or more software programs.
    Type: Application
    Filed: January 14, 2022
    Publication date: July 20, 2023
    Inventors: Rangan Basu, Rohit Gosain, Shibi Panikkar, Anup Kumar
  • Publication number: 20230230002
    Abstract: Automated supply chain management techniques are disclosed. For example, a method comprises the following steps. The method obtains a demand for a given number of an item associated with a manufacturing order. The method obtains a set of classifications for a set of suppliers based on historical data corresponding to each of the suppliers, and obtains a criticality indicator for the demand. The method generates an allocation for the demand across at least a subset of the set of suppliers based on the set of classifications and the criticality indicator, wherein each of the suppliers in the subset is allocated a given proportion of the demand in accordance with the generated allocation.
    Type: Application
    Filed: January 17, 2022
    Publication date: July 20, 2023
    Inventors: Shibi Panikkar, Robit Gosain, Ajay Maikhuri
  • Publication number: 20230222130
    Abstract: An apparatus comprises at least one processing device configured to, in a monitoring system in which at any given time at least one monitoring node has a primary monitoring role responsible for monitoring operation of system nodes of a distributed system and other monitoring nodes have a secondary monitoring role responsible for monitoring operation of the at least one monitoring node having the primary monitoring role, identify a first monitoring node having the primary monitoring role at a current time. The processing device is also configured to determine, based at least in part on a time-based ranking of the monitoring nodes, a second monitoring node having the secondary monitoring role at the current time to transition to the primary monitoring role, and to transition the second monitoring node to the primary monitoring role at a subsequent time.
    Type: Application
    Filed: January 11, 2022
    Publication date: July 13, 2023
    Inventors: Shibi Panikkar, Pratheek Veluswamy, Robert A. Lincourt, JR., Ravi Prakash Kulkarni
  • Publication number: 20230222359
    Abstract: Conversational artificial intelligence techniques with live agent engagement based on automated frustration level monitoring are disclosed. For example, a method comprises obtaining, via a conversational artificial intelligence system, a frustration level metric associated with a user participating in a conversation with the conversational artificial intelligence system, The method further comprises managing, via the conversational artificial intelligence system, human agent engagement in the conversation based on the frustration level metric.
    Type: Application
    Filed: January 11, 2022
    Publication date: July 13, 2023
    Inventors: Shibi Panikkar, Thirumaleshwara Shama, Jean Paul Sarkis
  • Publication number: 20230222169
    Abstract: An apparatus in an illustrative embodiment comprises at least one processing device that includes a processor coupled to a memory, with the at least one processing device being configured to obtain at least a portion of a uniform resource locator (URL) presented in a browser, to determine at least one of a domain and one or more cookies associated with the URL, to generate a file comprising information characterizing the at least one of the domain and the one or more cookies associated with the URL, to generate a multi-dimensional code based at least in part on the generated file, and to present the multi-dimensional code via the browser for scanning. The multi-dimensional code in some embodiments is presented for scanning by a mobile application of a mobile device of a user.
    Type: Application
    Filed: January 12, 2022
    Publication date: July 13, 2023
    Inventor: Shibi Panikkar
  • Patent number: 11693932
    Abstract: Techniques for managing activation of software, e.g., an operating system, in an information processing system are provided. For example, a method comprises the following steps. A data object is obtained for a system having an un-activated computer program stored thereon. The data object comprises information about the system encrypted by a private value. The method then causes the data object to be securely stored on a distributed ledger for subsequent access during a process to activate the computer program.
    Type: Grant
    Filed: November 3, 2022
    Date of Patent: July 4, 2023
    Assignee: Dell Products L.P.
    Inventors: Shibi Panikkar, Murali Devendranath
  • Publication number: 20230176837
    Abstract: An apparatus comprises at least one processing device configured to detect one or more issues associated with execution of a first version of a microservice in one or more computing environments, to determine whether any of the detected issues correspond to one or more triggers of one or more predefined patterns in a knowledge base, and, responsive to determining that at least one of the detected issues corresponds to at least one of the triggers of at least one of the predefined patterns in the knowledge base, to utilize code modification data structures specified in the at least one predefined pattern to modify source code of the microservice. The processing device is further configured to generate at least one additional version of the microservice utilizing the modified source code, and to deploy the at least one additional version of the microservice in at least one of the computing environments.
    Type: Application
    Filed: December 7, 2021
    Publication date: June 8, 2023
    Inventors: Parminder Singh Sethi, Shibi Panikkar
  • Publication number: 20230169135
    Abstract: An example methodology implementing the disclosed techniques includes receiving an online meeting Uniform Resource Locator (URL) for an online meeting that is being scheduled. The method also includes determining whether the online meeting is a secure online meeting. The method also includes, responsive to a determination that the online meeting is a secure online meeting, generating a personalized online meeting URL for each meeting participant that is invited to the secure online meeting, the personalized online meeting URL being based on the online meeting URL. The method further includes encrypting the generated personalized online meeting URLs and sending to each meeting participant that is invited an invitation to the secure online meeting. The invitation sent to each invited meeting participant includes an encrypted personalized online meeting URL that is generated for that invited meeting participant.
    Type: Application
    Filed: November 29, 2021
    Publication date: June 1, 2023
    Applicant: Dell Products L.P.
    Inventors: Shibi Panikkar, Rohit Gosain, Rangan Basu
  • Publication number: 20230168940
    Abstract: Techniques for task management in a parallel processing environment are disclosed. For example, a method comprises obtaining an indication of a data load for a given task, a time range within which the given task is to be executed, and a resource utilization limit for executing the task. The method computes a number of processes to be instantiated to execute the given task for the data load within the time range and the resource utilization limit. The method then schedules the given task to be executed by the computed number of processes in a parallel processing environment.
    Type: Application
    Filed: November 30, 2021
    Publication date: June 1, 2023
    Inventors: Shibi Panikkar, Rohit Gosain
  • Patent number: 11657112
    Abstract: Techniques are disclosed for data management techniques using artificial intelligence-based cache distribution within a distributed information processing system. For example, a cohesive and distributed machine learning approach between the same or similar customer data centers and products predict optimal data needed at each customer data center, and intelligently synchronize or federate the data between customer data centers and a core data center using a combination of customized caching and push techniques according to one or more customer behavior patterns.
    Type: Grant
    Filed: April 21, 2021
    Date of Patent: May 23, 2023
    Assignee: Dell Products L.P.
    Inventors: Shibi Panikkar, Ravi Kumar, Thirumaleshwara Shama
  • Patent number: 11651005
    Abstract: A method comprises dividing a plurality of operations of a microservice between a plurality of databases, and synchronizing data corresponding to the plurality of operations between the plurality of databases. The microservice is a create, read, update, delete (CRUD) microservice, and the plurality of operations comprise creating, reading, updating and deleting the data.
    Type: Grant
    Filed: May 4, 2020
    Date of Patent: May 16, 2023
    Assignee: EMC IP Holding Company LLC
    Inventors: Shibi Panikkar, Pratheek Veluswamy
  • Publication number: 20230123579
    Abstract: An apparatus comprises a processing device configured to determine an asset identifier for an information technology asset, to encrypt the asset identifier utilizing a public key of a first homomorphic encryption key pair, and to evaluate a first homomorphic encryption function for a first homomorphically encrypted access authorization object that takes as input the encrypted asset identifier and provides as output an encrypted access authorization identifier. The processing device is also configured to decrypt the access authorization identifier utilizing a secret key of the first homomorphic encryption key pair and, responsive to validating the access authorization identifier, to evaluate additional homomorphic encryption functions for additional homomorphically encrypted access authorization objects that return encrypted access authorization information.
    Type: Application
    Filed: October 14, 2021
    Publication date: April 20, 2023
    Inventor: Shibi Panikkar