Patents by Inventor Shyam Prakash
Shyam Prakash has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10200496Abstract: A system, a method, and a computer program product for providing a user interface configuration tool are disclosed. A first user interface containing a presentation is generated. The presentation is generated based on a template stored in a memory and includes a plurality of portions. The presentation is modified based on information stored in the memory. The information relates to at least one user and at least one activity to be performed by the user. A modified presentation is generated for displaying in the first user interface, where the modified presentation is presented in a first format. A second user interface is generated for displaying the modified presentation in the first format. The modified presentation is presented to the user in the second user interface.Type: GrantFiled: December 9, 2014Date of Patent: February 5, 2019Assignee: Successfactors, Inc.Inventors: Kalpana Karunamurthi, Shyam Prakash, Satish Ramteare, Muktha Hiremath
-
Patent number: 9892261Abstract: A system to identify and counter computer malware. The system comprises a processor, a memory, a data store comprising information about known computer malware, wherein the information about known computer malware is partitioned into a plurality of malware families, and comprising a plurality of mappings, wherein each mapping associates one malware family with at least one countermeasure for mitigating a risk to an information technology asset posed by the known computer malware associated with the malware family, and an application stored in the memory. The application analyzes a software artifact, determines characteristics of the software artifact, and determines a plurality of metrics, each metric representing a degree of match between the software artifact and one of the plurality of malware families. Based on the plurality of metrics, the application further determines a malware family that best matches the software artifact.Type: GrantFiled: April 28, 2015Date of Patent: February 13, 2018Assignee: FireEye, Inc.Inventors: Sharwan Kumar Joram, Shyam Prakash Jha, William Matthew Hartley, Madhav Sonthalia
-
Patent number: 9690616Abstract: Methods and devices for determining load on a computing device involve scheduling at least one idle thread for execution during a first sleep time of a predefined reference interval and, determining a natural load at a lapse of the first sleep time. If the natural load equals or exceeds a fixed load requirement for the predefined reference interval, a second sleep time is scheduled for the remainder of the predefined reference interval. If, instead, the natural load is less than the fixed load requirement and a fixed load time for the fixed load requirement equals the remainder of the predefined reference interval, an artificial load is generated for the remainder of the predefined reference interval.Type: GrantFiled: December 20, 2011Date of Patent: June 27, 2017Assignee: Optis Circuit Technology, LLCInventor: Shyam Prakash
-
Publication number: 20160323295Abstract: A system to identify and counter computer malware. The system comprises a processor, a memory, a data store comprising information about known computer malware, wherein the information about known computer malware is partitioned into a plurality of malware families, and comprising a plurality of mappings, wherein each mapping associates one malware family with at least one countermeasure for mitigating a risk to an information technology asset posed by the known computer malware associated with the malware family, and an application stored in the memory. The application analyzes a software artifact, determines characteristics of the software artifact, and determines a plurality of metrics, each metric representing a degree of match between the software artifact and one of the plurality of malware families. Based on the plurality of metrics, the application further determines a malware family that best matches the software artifact.Type: ApplicationFiled: April 28, 2015Publication date: November 3, 2016Inventors: Sharwan Kumar Joram, Shyam Prakash Jha, William Matthew Hartley, Madhav Sonthalia
-
Publication number: 20160162142Abstract: A system, a method, and a computer program product for providing a user interface configuration tool are disclosed. A first user interface containing a presentation is generated. The presentation is generated based on a template stored in a memory and includes a plurality of portions. The presentation is modified based on information stored in the memory. The information relates to at least one user and at least one activity to be performed by the user. A modified presentation is generated for displaying in the first user interface, where the modified presentation is presented in a first format. A second user interface is generated for displaying the modified presentation in the first format. The modified presentation is presented to the user in the second user interface.Type: ApplicationFiled: December 9, 2014Publication date: June 9, 2016Inventors: Kalpana Karunamurthi, Shyam Prakash, Satish Ramteare, Muktha Hiremath
-
Patent number: 9298539Abstract: Various systems and methods for automated error recovery in workflows. For example, one method involves executing operations of a first task. A workflow includes multiple tasks that include the first task. Each of the tasks represents one or more operations that are configured to access one or more elements. The method also involves detecting an error in execution of the one or more first operations, where the error indicates inaccessible elements. In response to the error detection, the method can automatically execute an error recovery portion of the first task. Execution of the error recovery portion includes receiving one or more responses, where the first task can use the response(s) instead of the one or more inaccessible elements.Type: GrantFiled: October 5, 2012Date of Patent: March 29, 2016Assignee: Veritas US IP Holdings LLCInventors: Joshua David Kruck, Shyam Prakash Velupula
-
Publication number: 20140331161Abstract: A system and method are provided for graphically displaying a weather hazard. The system is comprised of a display system coupled to a processor that is configured to retrieve weather information from a database and determine the severity of weather hazard present within a predetermined distance. The severity of the weather hazard is based on the phase of flight and type of weather hazards present within the weather envelope. The weather symbology that graphically represents the severe weather hazard within a weather envelope is rendered on the display.Type: ApplicationFiled: May 3, 2013Publication date: November 6, 2014Inventors: Sadguni Venkataswamy, Swetha Balasa, Shashidhara Veerabhadraiah, Shyam Prakash Yattukallu
-
Patent number: 8849763Abstract: Various systems and methods for using multiple clients for data backup are described. For example, one method involves accessing a namespace, where the namespace indicates locations of files. At least a portion of the namespace is divided into sets, where the sets correspond to a subset of the files. The files of the subset are accessed by plurality of nodes, and the accessing is based on the sets. Each of the nodes accesses the files of the subset. The nodes are used to store, at data storage, the files of the subset.Type: GrantFiled: February 29, 2012Date of Patent: September 30, 2014Assignee: Symantec CorporationInventors: Mehul R. Choube, Gaurav Malhotra, Shyam Prakash Velupula, Nitin Suresh Supekar
-
Patent number: 8738581Abstract: Various systems and methods for using multiple clients for data backup are described. For example, one method involves accessing a namespace, where the namespace indicates locations of files. At least a portion of the namespace is divided into sets, where the sets correspond to a subset of the files. The files of the subset are accessed by plurality of nodes, and the accessing is based on the sets. Each of the nodes accesses the files of the subset. The nodes are used to store, at data storage, the files of the subset.Type: GrantFiled: February 15, 2012Date of Patent: May 27, 2014Assignee: Symantec CorporationInventors: Mehul R. Choube, Gaurav Malhotra, Shyam Prakash Velupula, Nitin Suresh Supekar
-
Publication number: 20140040914Abstract: Methods and devices for determining load on a computing device (100) are described. The method includes scheduling at least one idle thread for a sleep time, determining a natural load at a lapse of the sleep time, and modifying at least one device parameter based at least on the determination.Type: ApplicationFiled: December 20, 2011Publication date: February 6, 2014Applicant: ST-Ericsson SAInventor: Shyam Prakash
-
Patent number: 8560785Abstract: Techniques for providing multiple levels of security for backups are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for providing multiple levels of security for a backup medium comprising protecting a data portion of the backup medium with a first security mechanism, and protecting a metadata portion of the backup medium with a second security mechanism.Type: GrantFiled: June 2, 2008Date of Patent: October 15, 2013Assignee: Symantec CorporationInventors: Gaurav Malhotra, Shyam Prakash Velupula, Vijaysinh Rangrao Mohite, Raymond W. Gilson, Thomas Clifford
-
Patent number: 7890527Abstract: Various methods and systems for implementing agents that facilitate end user searches of a backup catalog via a desktop search tool are disclosed. One method involves: receiving a search request from a desktop search tool, which is configured for use by an end user of a backup system; searching a backup catalog, maintained by the backup system, in response to the search request; and providing a result of searching the backup catalog to the desktop search tool.Type: GrantFiled: September 30, 2005Date of Patent: February 15, 2011Assignee: Symantec Operating CorporationInventors: Atul Avinash Nene, Shyam Prakash Velupula, Mukul Kumar, Ajit Vishnu Dhumale, Anand Gopinath Das