Patents by Inventor Sreedhar B. Kodali
Sreedhar B. Kodali has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11356541Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: GrantFiled: September 30, 2019Date of Patent: June 7, 2022Assignee: International Business Machines CorporationInventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G. M. Richards, Sivasakthi Thirugnanapandi
-
Patent number: 11212374Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: GrantFiled: September 30, 2019Date of Patent: December 28, 2021Assignee: International Business Machines CorporationInventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G. M. Richards, Sivasakthi Thirugnanapandi
-
Publication number: 20200028943Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: ApplicationFiled: September 30, 2019Publication date: January 23, 2020Inventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G.M. Richards, Sivasakthi Thirugnanapandi
-
Publication number: 20200028942Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: ApplicationFiled: September 30, 2019Publication date: January 23, 2020Inventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G.M. Richards, Sivasakthi Thirugnanapandi
-
Patent number: 10348868Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: GrantFiled: December 13, 2017Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G. M. Richards, Sivasakthi Thirugnanapandi
-
Publication number: 20180103125Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: ApplicationFiled: December 13, 2017Publication date: April 12, 2018Inventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G.M. Richards, Sivasakthi Thirugnanapandi
-
Publication number: 20180103124Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: ApplicationFiled: December 13, 2017Publication date: April 12, 2018Inventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G.M. Richards, Sivasakthi Thirugnanapandi
-
Publication number: 20180103126Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: ApplicationFiled: December 13, 2017Publication date: April 12, 2018Inventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G.M. Richards, Sivasakthi Thirugnanapandi
-
Patent number: 9936051Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: GrantFiled: July 7, 2015Date of Patent: April 3, 2018Assignee: International Business Machines CorporationInventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G. M. Richards, Sivasakthi Thirugnanapandi
-
Patent number: 9727332Abstract: Embodiments relate to information technology resource management and scaling. According to one aspect, an upcoming event impacting an application operating on one or more resources is identified. A workload on the application is predicted based on the upcoming event identified and historical data about a previous event having similarity with the upcoming event. The prediction is performed using a predefined rule. A number of resources required to process the predicted workload is ascertained using a past scaling history of the application. The resources are scaled based on the ascertained number of said resources determined before the occurrence of the event.Type: GrantFiled: November 22, 2013Date of Patent: August 8, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sreedhar B. Kodali, Daniel N. Millwood, Sandeep Raghav, Srinivasa B. Vadlamudi
-
Patent number: 9729466Abstract: Embodiments relate to information technology resource management and scaling. According to one aspect, an upcoming event impacting an application operating on one or more resources is identified. A workload on the application is predicted based on the upcoming event identified and historical data about a previous event having similarity with the upcoming event. The prediction is performed using a predefined rule. A number of resources required to process the predicted workload is ascertained using a past scaling history of the application. The resources are scaled based on the ascertained number of said resources determined before the occurrence of the event.Type: GrantFiled: June 6, 2014Date of Patent: August 8, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sreedhar B. Kodali, Daniel N. Millwood, Sandeep Raghav, Srinivasa B. Vadlamudi
-
Publication number: 20170012844Abstract: In an approach for managing network sockets, a computer receives a request to create a network socket to transfer data. The computer identifies information associated with the received request, including one or more of: a default network protocol, one or more supported network protocols, ahead of time initialization, a data transfer policy, a failure policy, and a security policy. The computer creates a second level hash map based on the identified information, wherein the second level hash map includes the supported network socket protocols and a connection state. The computer determines a network protocol to utilize associated with the received request. The computer establishes a connection for the network socket over the determined network protocol.Type: ApplicationFiled: July 7, 2015Publication date: January 12, 2017Inventors: Timothy P. Ellison, Ankur Gupta, Sreedhar B. Kodali, Xiaoqiao Meng, Neil G.M. Richards, Sivasakthi Thirugnanapandi
-
Publication number: 20150149608Abstract: Embodiments relate to information technology resource management and scaling. According to one aspect, an upcoming event impacting an application operating on one or more resources is identified. A workload on the application is predicted based on the upcoming event identified and historical data about a previous event having similarity with the upcoming event. The prediction is performed using a predefined rule. A number of resources required to process the predicted workload is ascertained using a past scaling history of the application. The resources are scaled based on the ascertained number of said resources determined before the occurrence of the event.Type: ApplicationFiled: November 22, 2013Publication date: May 28, 2015Applicant: International Business Machines CorporationInventors: Sreedhar B. Kodali, Daniel N. Millwood, Sandeep Raghav, Srinivasa B. Vadlamudi
-
Publication number: 20150149618Abstract: Embodiments relate to information technology resource management and scaling. According to one aspect, an upcoming event impacting an application operating on one or more resources is identified. A workload on the application is predicted based on the upcoming event identified and historical data about a previous event having similarity with the upcoming event. The prediction is performed using a predefined rule. A number of resources required to process the predicted workload is ascertained using a past scaling history of the application. The resources are scaled based on the ascertained number of said resources determined before the occurrence of the event.Type: ApplicationFiled: June 6, 2014Publication date: May 28, 2015Inventors: Sreedhar B. Kodali, Daniel N. Millwood, Sandeep Raghav, Srinivasa B. Vadlamudi