Patents by Inventor Sivaram Gottimukkala
Sivaram Gottimukkala has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11210123Abstract: A method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM can be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.Type: GrantFiled: May 31, 2017Date of Patent: December 28, 2021Assignee: International Business Machines CorporationInventors: Wesley M. Devine, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Michael S. Law, Linwood H. Overby
-
Patent number: 10523491Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.Type: GrantFiled: October 25, 2010Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
-
Publication number: 20170329624Abstract: In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM can be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.Type: ApplicationFiled: May 31, 2017Publication date: November 16, 2017Inventors: Wesley M. Devine, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Michael S. Law, Linwood H. Overby
-
Patent number: 9742621Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. Finally, the method can include re-binding the application endpoint to a second of the different network resource nodes in response to detecting the outage.Type: GrantFiled: February 28, 2012Date of Patent: August 22, 2017Assignee: International Business Machines CorporationInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
-
Patent number: 9715401Abstract: In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM can be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.Type: GrantFiled: September 15, 2008Date of Patent: July 25, 2017Assignee: International Business Machines CorporationInventors: Wesley M. Devine, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Michael S. Law, Linwood H. Overby, Jr.
-
Patent number: 9529624Abstract: A method, system and computer program product for determining a relative priority for a job. A “policy” is selected based on the job itself and the reason that the job is being executed, where the policy includes a priority range for the job and for an application. A priority for the job that is within the priority range of the job as established by the selected policy is determined based on environmental and context considerations. This job priority is then adjusted based on the priority of the application (within the priority range as established by the policy) becoming the job's final priority. By formulating a priority that more accurately reflects the true priority or importance of the job by taking into consideration the environmental and context considerations, job managers will now be able to process these jobs in a more efficient manner.Type: GrantFiled: February 4, 2013Date of Patent: December 27, 2016Assignee: International Business Machines CorporationInventors: Rohith K. Ashok, Roy F. Brabson, Michael J. Burr, Sivaram Gottimukkala, Hugh E. Hockett, Kristin R. Whetstone
-
Publication number: 20140223443Abstract: A method, system and computer program product for determining a relative priority for a job. A “policy” is selected based on the job itself and the reason that the job is being executed, where the policy includes a priority range for the job and for an application. A priority for the job that is within the priority range of the job as established by the selected policy is determined based on environmental and context considerations. This job priority is then adjusted based on the priority of the application (within the priority range as established by the policy) becoming the job's final priority. By formulating a priority that more accurately reflects the true priority or importance of the job by taking into consideration the environmental and context considerations, job managers will now be able to process these jobs in a more efficient manner.Type: ApplicationFiled: February 4, 2013Publication date: August 7, 2014Applicant: International Business Machines CorporationInventors: Rohith K. Ashok, Roy F. Brabson, Michael J. Burr, Sivaram Gottimukkala, Hugh E. Hockett, Kristin R. Whetstone
-
Patent number: 8458763Abstract: A computer-implemented method of enabling security in network resources provisioned as part of a service landscape instance is provided. The method includes initiating an orchestration process for creating a landscape service instance to provide services to a service subscriber over a data communications network. The method further includes deriving from the orchestration process at least one parameter, and generating at least one security configuration profile based upon the at least one parameter for at least one system of the landscape service instance.Type: GrantFiled: July 1, 2008Date of Patent: June 4, 2013Assignee: International Business Machines CorporationInventors: Sivaram Gottimukkala, Lap Huynh, Dinakaran Joseph, Michael Law, Linwood Overby, Jr., Wesley Devine, Michael Behrendt, Gerd Breiter
-
Patent number: 8424053Abstract: A computer-implemented method is provided for updating network security policy rules when network resources are provisioned in a service landscape instance. The method includes categorizing network resources in a service landscape instance based on a service landscape model. The method further includes responding to the provisioning of a network resource by automatically generating one or more security policy rules for a newly-provisioned network resource. Additionally, the method includes updating security policy rules of pre-existing network resources in the service landscape instance that are determined to be eligible to communicate with the newly-provisioned network resource so as to include the newly-provisioned network resource as a remote resource based on the service landscape model.Type: GrantFiled: July 1, 2008Date of Patent: April 16, 2013Assignee: International Business Machines CorporationInventors: Sivaram Gottimukkala, Lap Huynh, Dinakaran Joseph, Linwood Overby, Jr., Wesley Devine, Michael Behrendt, Gerd Breiter
-
Patent number: 8380861Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.Type: GrantFiled: February 3, 2011Date of Patent: February 19, 2013Assignee: International Business Machines CorporationInventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
-
Publication number: 20120213059Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. Finally, the method can include re-binding the application endpoint to a second of the different network resource nodes in response to detecting the outage.Type: ApplicationFiled: February 28, 2012Publication date: August 23, 2012Applicant: International Business Machines CorporationInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
-
Publication number: 20110125914Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.Type: ApplicationFiled: February 3, 2011Publication date: May 26, 2011Applicant: International Business Machines CorporationInventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
-
Patent number: 7912968Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.Type: GrantFiled: August 29, 2007Date of Patent: March 22, 2011Assignee: International Business Machines CorporationInventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
-
Publication number: 20110038256Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.Type: ApplicationFiled: October 25, 2010Publication date: February 17, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T. Huynh, Barry Mosakowski
-
Patent number: 7821921Abstract: Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes.Type: GrantFiled: April 22, 2007Date of Patent: October 26, 2010Assignee: International Business Machines CorporationInventors: Dinakaran Joseph, Jon K. Franks, Christopher N. Freeman, Sivaram Gottimukkala, Jason P. Hawrysz, Lap T Huynh, Barry Mosakowski
-
Publication number: 20100071025Abstract: In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM cna be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.Type: ApplicationFiled: September 15, 2008Publication date: March 18, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Wesley M. Devine, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Michael S. Law, Linwood H. Overby, JR.
-
Publication number: 20100005505Abstract: A computer-implemented method is provided for updating network security policy rules when network resources are provisioned in a service landscape instance. The method includes categorizing network resources in a service landscape instance based on a service landscape model. The method further includes responding to the provisioning of a network resource by automatically generating one or more security policy rules for a newly-provisioned network resource. Additionally, the method includes updating security policy rules of pre-existing network resources in the service landscape instance that are determined to be eligible to communicate with the newly-provisioned network resource so as to include the newly-provisioned network resource as a remote resource based on the service landscape model.Type: ApplicationFiled: July 1, 2008Publication date: January 7, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sivaram Gottimukkala, Lap Huynh, Dinakaran Joseph, Gerd Brieter, Linwood Overby, JR., Wesley Devine, Michael Behrendt
-
Publication number: 20100005504Abstract: A computer-implemented method of enabling security in network resources provisioned as part of a service landscape instance is provided. The method includes initiating an orchestration process for creating a landscape service instance to provide services to a service subscriber over a data communications network. The method further includes deriving from the orchestration process at least one parameter, and generating at least one security configuration profile based upon the at least one parameter for at least one system of the landscape service instance.Type: ApplicationFiled: July 1, 2008Publication date: January 7, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sivaram Gottimukkala, Lap Huynh, Dinakaran Joseph, Michael Law, Linwood Overby, JR., Wesley Devine, Michael Behrendt, Gerd Breiter
-
Patent number: 7546379Abstract: Techniques are disclosed that enable an application to prioritize its traffic in an application-specific manner, such that traffic which is most important to this application can be prioritized over traffic that is less important to this application, where this prioritization information is reflected in differential treatment of the traffic within the network. An application conveys relative priority information for its traffic to a Web proxy or edge server, and this device then consults stored policy information to determine how the traffic should be prioritized in the network. The Web proxy also ensures that usage of network resources is balanced among multiple applications. Cookies are used for transmitting priority information between the edge server and application in an efficient manner.Type: GrantFiled: October 6, 2007Date of Patent: June 9, 2009Assignee: International Business Machines CorporationInventors: Roger A. Bess, Roberto Delima, Sivaram Gottimukkala, Jason Paul Hawrysz, Lap Thiet Huynh, Dinakaran B. Joseph, John J. Majikes
-
Publication number: 20090063673Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.Type: ApplicationFiled: August 29, 2007Publication date: March 5, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma