Patents by Inventor Smeeth Virpariya

Smeeth Virpariya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240345886
    Abstract: An example a management node may include a processor and memory coupled to the processor. The memory may include a resource management module to determine a maintenance schedule of a resource in a data center. Prior to the resource entering the maintenance schedule, the resource management module may determine a set of resources having a dependency relationship with the resource based on a preselected category. During the maintenance schedule of the resource, the resource management module may mark that the resource and the set of resources having the dependency relationship with the resource are in a maintenance mode. Upon marking the resource and the set of resources, the resource management module may suspend monitoring of the resource and the set of resources.
    Type: Application
    Filed: June 8, 2023
    Publication date: October 17, 2024
    Inventors: Padmini Sampige THIRUMALACHAR, Smeeth VIRPARIYA, Vaghinak SAGHATELYAN, Bhanukiran KARANAM
  • Publication number: 20240143776
    Abstract: In an example, a computer-implemented method may include receiving vulnerability data indicative of a vulnerability associated with a computing environment from a security scanning platform. Further, the method may include determining a type of the vulnerability and determining an operating system component, an application component, or both being vulnerable to a security threat based on the type of vulnerability. Furthermore, the method may include determining a compute node, of the computing environment, hosting the operating system component, the application component, or both that are vulnerable. Further, the method may include generating an alert notification indicating that the operating system component, the application component, or both along with the determined compute node are vulnerable to the security threat.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Inventors: Padmini Sampige Thirumalachar, Madhan Sankar, Punith S, Smeeth Virpariya