Patents by Inventor Siva Subramaniam MANICKAM
Siva Subramaniam MANICKAM has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11983572Abstract: Examples described herein relate to a method and a system, for example, a workload controller, for accessing purged workloads. An alert indicative of an attempt to access a purged workload of workloads deployed in a workload environment may be received by the workload controller. The purged workload may include one or both of a deactivated workload or an archived workload. The workload controller may detect the attempt to access the purged workload based on port mirrored data traffic. Further, in some examples, the workload controller may activate the purged workload based on the alert.Type: GrantFiled: June 3, 2021Date of Patent: May 14, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Thavamaniraja Sakthivel, Siva Subramaniam Manickam, Vinnarasu Ganesan, Sriram Padmachetty Harinath
-
Patent number: 11775333Abstract: In some examples, a system associates, with a plurality of virtual resources deployed in a cloud environment, properties representative of characteristics of the virtual resources, the properties comprising a performance level of a virtual resource. The system receives a request to create a virtual resource in the cloud environment, and, in response to determining that properties of the virtual resource to be created for the request satisfy a criterion with respect to properties of a given virtual resource of the plurality of virtual resources, selects the given virtual resource as a candidate virtual resource for the request.Type: GrantFiled: December 13, 2022Date of Patent: October 3, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Thavamaniraja Sakthivel, Siva Subramaniam Manickam, Vinnarasu Ganesan, Balaji Ramamoorthi
-
Publication number: 20230115795Abstract: Examples relate to preventing scheduling or executing a resource on an inconsistent host node in a networked system. Some examples track a taint status of the host node and identify whether the host node is inconsistent based on the taint status of the host node over a predefined period of time. Upon identifying that the host node is inconsistent, a master taint is applied on the inconsistent host node, which prevents scheduling or executing a resource on the identified inconsistent host node.Type: ApplicationFiled: November 7, 2022Publication date: April 13, 2023Inventors: Siva Subramaniam Manickam, Vinnarasu Ganesan, Thavamaniraja Sakthivel, Balaji Ramamoorthi
-
Publication number: 20230109933Abstract: In some examples, a system associates, with a plurality of virtual resources deployed in a cloud environment, properties representative of characteristics of the virtual resources, the properties comprising a performance level of a virtual resource. The system receives a request to create a virtual resource in the cloud environment, and, in response to determining that properties of the virtual resource to be created for the request satisfy a criterion with respect to properties of a given virtual resource of the plurality of virtual resources, selects the given virtual resource as a candidate virtual resource for the request.Type: ApplicationFiled: December 13, 2022Publication date: April 13, 2023Inventors: Thavamaniraja Sakthivel, Siva Subramaniam Manickam, Vinnarasu Ganesan, Balaji Ramamoorthi
-
Patent number: 11561878Abstract: Examples described relate to determining a future operation failure in a cloud system. In an example, a historical utilization of resources for performing an operation in a cloud system may be determined. A current utilization of resources in the cloud system may be determined. Based on the historical utilization of resources for performing the operation in the cloud system and the current utilization of resources in the cloud system, a determination may be made whether a future performance of the operation in the cloud system is likely to be a failure. In response to a determination that the future performance of the operation in the cloud system is likely to be a failure, an alert may be generated.Type: GrantFiled: April 26, 2019Date of Patent: January 24, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Thavamaniraja Sakthivel, Siva Subramaniam Manickam, Vinnarasu Ganesan, Balaji Ramamoorthi
-
Publication number: 20230011413Abstract: Examples described herein relate to a method and a system, for example, a restore management system for providing secure restore of computing system. In some examples, the restore management system may determine that the computing system is restored. Further, the restore management system may isolate the computing system by restricting access to the computing system for any data traffic other than data traffic associated with a security fix to be applied to the computing system. Furthermore, the restore management system may determine that the security fix has been successfully applied to the computing system and, in response to determining that the security fix has been successfully applied, the restore management system may remove the computing system from isolation.Type: ApplicationFiled: November 15, 2021Publication date: January 12, 2023Inventors: Gavin Brebner, Siva Subramaniam Manickam
-
Patent number: 11537423Abstract: In some examples, a system associates, with a plurality of virtual resources deployed in a cloud environment, properties representative of characteristics of the virtual resources, the properties comprising a performance level of a virtual resource. The system receives a request to create a virtual resource in the cloud environment, and, in response to determining that properties of the virtual resource to be created for the request satisfy a criterion with respect to properties of a given virtual resource of the plurality of virtual resources, selects the given virtual resource as a candidate virtual resource for the request.Type: GrantFiled: March 16, 2020Date of Patent: December 27, 2022Assignee: Hewlett Packard Enterprise Development LPInventors: Thavamaniraja Sakthivel, Siva Subramaniam Manickam, Vinnarasu Ganesan, Balaji Ramamoorthi
-
Publication number: 20220391251Abstract: Examples described herein relate to a method and a system, for example, a workload controller, for accessing purged workloads. An alert indicative of an attempt to access a purged workload of workloads deployed in a workload environment may be received by the workload controller. The purged workload may include one or both of a deactivated workload or an archived workload. The workload controller may detect the attempt to access the purged workload based on port mirrored data traffic. Further, in some examples, the workload controller may activate the purged workload based on the alert.Type: ApplicationFiled: June 3, 2021Publication date: December 8, 2022Inventors: Thavamaniraja Sakthivel, Siva Subramaniam Manickam, Vinnarasu Ganesan, Sriram Padmachetty Harinath
-
Patent number: 11496499Abstract: Examples relate to preventing scheduling or executing a resource on an inconsistent host node in a networked system. Some examples track a taint status of the host node and identify whether the host node is inconsistent based on the taint status of the host node over a predefined period of time. Upon identifying that the host node is inconsistent, a master taint is applied on the inconsistent host node, which prevents scheduling or executing a resource on the identified inconsistent host node.Type: GrantFiled: April 21, 2021Date of Patent: November 8, 2022Assignee: Hewlett Packard Enterprise Development LPInventors: Siva Subramaniam Manickam, Vinnarasu Ganesan, Thavamaniraja Sakthivel, Balaji Ramamoorthi
-
Publication number: 20220114005Abstract: Examples relate to comparing sets of tags for determining whether a VM image matches another VM image. Some examples generate a first set of tags corresponding to a first VM image that is to be created, compare a second set of tags corresponding to a second VM image available in an image store, with the first set of tags to determine whether the second VM image matches the first VM image, and send the result of the comparison to an image builder.Type: ApplicationFiled: April 21, 2021Publication date: April 14, 2022Inventors: Balaji Ramamoorthi, Siva Subramaniam Manickam, Thavamaniraja Sakthivel, Vinnarasu Ganesan
-
Publication number: 20220103580Abstract: Examples relate to preventing scheduling or executing a resource on an inconsistent host node in a networked system. Some examples track a taint status of the host node and identify whether the host node is inconsistent based on the taint status of the host node over a predefined period of time. Upon identifying that the host node is inconsistent, a master taint is applied on the inconsistent host node, which prevents scheduling or executing a resource on the identified inconsistent host node.Type: ApplicationFiled: April 21, 2021Publication date: March 31, 2022Inventors: Siva Subramaniam Manickam, Vinnarasu Ganesan, Thavamaniraja Sakthivel, Balaji Ramamoorthi
-
Patent number: 11216296Abstract: Virtual machine images available across a plurality of cloud networks may be identified. A catalog of the virtual machine images may be generated. The catalog may comprise, for each virtual machine image, a mapping information, comprising: a name of a virtual machine image, a name of a virtual machine instance based on the virtual machine image, a name of a cloud network providing the virtual machine image, a cost of deploying the virtual machine instance on the cloud network, a tag identifying a feature of the virtual machine image, and an identification tag assigned to the virtual machine image. For a given virtual machine instance, the catalog of the virtual machine images may be analyzed to identify a least cost cloud network.Type: GrantFiled: April 17, 2019Date of Patent: January 4, 2022Assignee: Hewlett Packard Enterprise Development LPInventors: Balaji Ramamoorthi, Siva Subramaniam Manickam, Vinnarasu Ganesan, Thavamaniraja Sakthivel
-
Publication number: 20210026700Abstract: Examples described relate to managing a containerized application in a cloud system based on usage. In an example, a determination may be made whether a containerized application in a cloud system has not been used for a pre-defined period of time. In response to the determination, the containerized application may be deleted. The information related to the containerized application in a database may be stored in a database. In response to a future user request to access the containerized application, a new containerized application may be created in the cloud system based on the information related to the containerized application in the database. A new public service endpoint may be associated with the new containerized application in the cloud system. User access to the new containerized application in the cloud system may be allowed via the new public service endpoint.Type: ApplicationFiled: July 25, 2019Publication date: January 28, 2021Inventors: Siva Subramaniam Manickam, Thavamaniraja Sakthivel, Vinnarasu Ganesan, Balaji Balaji Ramamoorthi
-
Publication number: 20210029196Abstract: Examples described relate to managing a public service endpoint to a workload in a public cloud system. In an example, a determination may be made whether a public service endpoint to a workload in a public cloud system has not been accessed for a pre-defined period of time. In response to a determination that the public service endpoint to the workload in the public cloud system has not been accessed for the pre-defined period of time, the public service endpoint to the workload may be deleted. In response to a determination that an alias service endpoint associated with the public service endpoint has been accessed, a new public service endpoint may be associated with the workload in the public cloud system. Access to the workload in the public cloud system may be allowed via the new public service endpoint.Type: ApplicationFiled: July 23, 2019Publication date: January 28, 2021Inventors: Siva Subramaniam Manickam, Thavamaniraja Sakthivel, Vinnarasu Ganesan, Balaji Ramamoorthi
-
Publication number: 20200341881Abstract: Examples described relate to determining a future operation failure in a cloud system. In an example, a historical utilization of resources for performing an operation in a cloud system may be determined. A current utilization of resources in the cloud system may be determined. Based on the historical utilization of resources for performing the operation in the cloud system and the current utilization of resources in the cloud system, a determination may be made whether a future performance of the operation in the cloud system is likely to be a failure. In response to a determination that the future performance of the operation in the cloud system is likely to be a failure, an alert may be generated.Type: ApplicationFiled: April 26, 2019Publication date: October 29, 2020Inventors: Thavamaniraja Sakthivel, Siva Subramaniam Manickam, Vinnarasu Ganesan, Balaji Ramamoorthi
-
Publication number: 20200334059Abstract: Examples described relate to identifying a least cost cloud network for deploying a virtual machine instance. In an example, virtual machine images available across a plurality of cloud networks may be identified. A catalog of the virtual machine images may be generated. The catalog may comprise, for each virtual machine image, a mapping information, comprising: a name of a virtual machine image, a name of a virtual machine instance based on the virtual machine image, a name of a cloud network providing the virtual machine image, a cost of deploying the virtual machine instance on the cloud network, a tag identifying a feature of the virtual machine image, and an identification tag assigned to the virtual machine image. For a given virtual machine instance, the catalog of the virtual machine images may be analyzed to identify a least cost cloud network.Type: ApplicationFiled: April 17, 2019Publication date: October 22, 2020Inventors: Balaji Ramamoorthi, Siva Subramaniam Manickam, Vinnarasu Ganesan, Thavamaniraja Sakthivel
-
Publication number: 20200301724Abstract: In some examples, a system associates, with a plurality of virtual resources deployed in a cloud environment, properties representative of characteristics of the virtual resources, the properties comprising a performance level of a virtual resource. The system receives a request to create a virtual resource in the cloud environment, and, in response to determining that properties of the virtual resource to be created for the request satisfy a criterion with respect to properties of a given virtual resource of the plurality of virtual resources, selects the given virtual resource as a candidate virtual resource for the request.Type: ApplicationFiled: March 16, 2020Publication date: September 24, 2020Inventors: Thavamaniraja Sakthivel, Siva Subramaniam Manickam, Vinnarasu Ganesan, Balaji Ramamoorthi
-
Patent number: 10671508Abstract: Some examples described herein relate to testing of a cloud service. In an example, a cloud service to be tested may be deployed in a cloud system. A test load may be applied to the cloud service. Upon application of the test load to the cloud service, a determination may be made whether a performance metric related to the cloud service meets a pre-configured criterion. If the performance metric related to the cloud service meets a pre-configured criterion, the cloud service may be scaled. Operations of applying, determining, and scaling may iterated until an end condition is met, wherein the test load applied to the cloud service may vary after each iteration operation.Type: GrantFiled: November 19, 2014Date of Patent: June 2, 2020Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Upendra Gopu, Anusha Kadambala, Siva Subramaniam Manickam
-
Publication number: 20200137029Abstract: In some examples, a method includes receiving access credentials for a deployment unit (DU) of a remote cloud service; and establishing a secure channel with the DU using the access credentials for monitoring of the DU. In some examples, the secure channel is established through the use of an on-demand port forwarding container.Type: ApplicationFiled: October 29, 2018Publication date: April 30, 2020Inventors: Thavamaniraja Sakthievel, Vinnarasu Ganesan, Siva Subramaniam Manickam
-
Publication number: 20200104222Abstract: Systems and methods are provided herein for server cluster environment management and failure recovery therein. Clusters of a cluster server environment are monitored by a resource manager. The resource manager maintains a standby server pool of servers from the server cluster environment. A cluster monitor monitors the clusters of servers and automatically detects server and cluster failures. An optimal recovery server from among the standby server pool is identified based on the configuration information of the failing server or the failing cluster. The identified optimal recovery server is added to the failing cluster or the cluster with the failing server, and configured based on the stored configuring information of the failed server or the failed cluster.Type: ApplicationFiled: September 28, 2018Publication date: April 2, 2020Inventors: Balaji Ramamoorthi, Siva Subramaniam Manickam, Vinnarasu Ganesan, Thavamaniraja Sakthivei