Patents by Inventor Sudheesh S. Kairali
Sudheesh S. Kairali has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200092224Abstract: A method, computer program product, and system includes a processor(s) obtaining historical data related to buffer space usage of a common shared storage resource by a group of journals. The processor(s) monitors each journal over repeating temporal periods and determined a predictability for each journal (i.e., predictable or unpredictable. The processor(s) generates usage statics for each journal during each monitored period dependent on whether the journal was predictable or unpredictable during the monitored period. For each monitored period, the processor(s) ranks predictable journals by a buffer space requirement for each journal of the predictable journals. Based on the rankings, the processor(s) determined a buffer space requirement for each journal for a current period, where the current period shares temporal qualities with the given monitored period. The processor(s) allocates, for use during the current period, based on the buffer space requirement, buffer space to each journal.Type: ApplicationFiled: November 22, 2019Publication date: March 19, 2020Inventors: Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Jagdish Kumar, Sunil Kumar S. Singh
-
Patent number: 10574527Abstract: As disclosed herein a computer-implemented method includes providing a plurality of resource allocation zones corresponding to a plurality of overcommit policies. The method further includes receiving a request for a resource for a tenant, and determining a selected overcommit policy corresponding to an anticipated resource need. The method further includes selecting a resource allocation zone for the tenant from the plurality of resource allocation zones, and providing the resource to the tenant. A computer program product and a computer system corresponding to the above method are also disclosed herein.Type: GrantFiled: May 9, 2016Date of Patent: February 25, 2020Assignee: International Business Machines CorporationInventors: Ashish Billore, Sudheesh S. Kairali
-
Patent number: 10567305Abstract: A method, computer program product, and system includes a processor(s) obtaining historical data related to buffer space usage of a common shared storage resource by a group of journals. The processor(s) monitors each journal over repeating temporal periods and determined a predictability for each journal (i.e., predictable or unpredictable. The processor(s) generates usage statics for each journal during each monitored period dependent on whether the journal was predictable or unpredictable during the monitored period. For each monitored period, the processor(s) ranks predictable journals by a buffer space requirement for each journal of the predictable journals. Based on the rankings, the processor(s) determined a buffer space requirement for each journal for a current period, where the current period shares temporal qualities with the given monitored period. The processor(s) allocates, for use during the current period, based on the buffer space requirement, buffer space to each journal.Type: GrantFiled: December 27, 2017Date of Patent: February 18, 2020Assignee: International Business Machines CorporationInventors: Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Jagdish Kumar, Sunil Kumar S. Singh
-
Patent number: 10560396Abstract: A method, computer program product, and system includes a processor(s) obtaining historical data related to buffer space usage of a common shared storage resource by a group of journals. The processor(s) monitors each journal over repeating temporal periods and determined a predictability for each journal (i.e., predictable or unpredictable. The processor(s) generates usage statics for each journal during each monitored period dependent on whether the journal was predictable or unpredictable during the monitored period. For each monitored period, the processor(s) ranks predictable journals by a buffer space requirement for each journal of the predictable journals. Based on the rankings, the processor(s) determined a buffer space requirement for each journal for a current period, where the current period shares temporal qualities with the given monitored period. The processor(s) allocates, for use during the current period, based on the buffer space requirement, buffer space to each journal.Type: GrantFiled: October 4, 2017Date of Patent: February 11, 2020Assignee: International Business Machines CorporationInventors: Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Jagdish Kumar, Sunil Kumar S. Singh
-
Publication number: 20200045068Abstract: Aspects of the present invention provide an approach for providing network intrusion detection and prevention service (NIDPS) capabilities to a microservice in a networked computing environment. In an embodiment, a set of rules for accessing the microservice is retrieved. A NIDPS microservice is created within the environment of the microservice fabric that supports the microservice using the set of rules. The NIDPS microservice is established as a proxy communications destination for communications to the microservice such that communications that are intended for the microservice are instead rerouted to the NIDPS microservice. These communications are filtered by the NIDPS microservice according to the set of rules (e.g., to remove any communications that are determined to be threats).Type: ApplicationFiled: October 14, 2019Publication date: February 6, 2020Inventors: Vinit Jain, Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Madhuri Madhavan Pillai
-
Patent number: 10554675Abstract: Aspects of the present invention provide an approach for providing network intrusion detection and prevention service (NIDPS) capabilities to a microservice in a networked computing environment. In an embodiment, a set of rules for accessing the microservice is retrieved. A NIDPS microservice is created within the environment of the microservice fabric that supports the microservice using the set of rules. The NIDPS microservice is established as a proxy communications destination for communications to the microservice such that communications that are intended for the microservice are instead rerouted to the NIDPS microservice. These communications are filtered by the NIDPS microservice according to the set of rules (e.g., to remove any communications that are determined to be threats).Type: GrantFiled: December 21, 2017Date of Patent: February 4, 2020Assignee: International Business Machines CorporationInventors: Vinit Jain, Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Madhuri Madhavan Pillai
-
Publication number: 20190372785Abstract: A computer-implemented method for distributing digital certificates. A request for a digital certificate is received from a requesting system. A deployment challenge is sent to the trust agent running on the requesting system. A response to the deployment challenge is received from the trust agent running on the requesting system. The response to the deployment challenge is evaluated to determine whether the response is correct. The digital certificate is distributed to the requesting system in response to a determination that the response to the deployment challenge is correct.Type: ApplicationFiled: August 13, 2019Publication date: December 5, 2019Inventors: Karunakar Bojjireddy, Sreekanth Ramakrishna Iyer, Sudheesh S. Kairali, Vijay Kalangumvathakkal, Nataraj Nagaratnam, Gal Shachor
-
Publication number: 20190310887Abstract: An approach is provided for managing a timeout and polling interval of an operation of an application. A recommendation specifying the timeout and polling interval is selected. The timeout and polling interval are applied to a deployed image. Based on polling intervals, numbers of polls for operations, identifications of the operations, and environments of the operations, a minimum number of polls of the operation in an environment before a successful completion of the operation is determined and an old polling interval used between the polls of the operation is determined. If the minimum number of polls is greater than one, the polling interval specified in the recommendation is determined as the minimum number of polls multiplied by the old polling interval. If the minimum number of polls equals one, the polling interval specified in the recommendation is determined by decreasing the old polling interval by a configurable factor.Type: ApplicationFiled: June 21, 2019Publication date: October 10, 2019Inventor: Sudheesh S. Kairali
-
Publication number: 20190268166Abstract: A computer-implemented method, system, and non-transitory computer program product for distributing digital certificates. A request for a digital certificate is received from a requesting system. A deployment challenge is sent to the trust agent running on the requesting system. A response to the deployment challenge is received from the trust agent running on the requesting system. The response to the deployment challenge is evaluated to determine whether the response is correct. The digital certificate is distributed to the requesting system in response to a determination that the response to the deployment challenge is correct.Type: ApplicationFiled: February 23, 2018Publication date: August 29, 2019Inventors: Karunakar Bojjireddy, Sreekanth Ramakrishna Iyer, Sudheesh S. Kairali, Vijay Kalangumvathakkal, Nataraj Nagaratnam, Gal Shachor
-
Patent number: 10372496Abstract: An approach is provided for managing a timeout and polling interval of an operation of an application. A type of the application is received. Based on the type, it is determined that the application requires optimizations of the timeout and polling interval. Whether a data repository includes recommendations of timeout(s) and polling interval(s) for operation(s) of applications of the received type is determined. If the data repository includes the recommendations, a recommendation that specifies the timeout and polling interval is selected from the recommendations and the timeout and polling interval are applied to a deployed image, or if the data repository does not include the recommendations, a user entry of values for an optimal timeout and an optimal polling interval is received and a workload is deployed. The workload has a configuration that includes the values for the optimal timeout and the optimal polling interval.Type: GrantFiled: January 6, 2017Date of Patent: August 6, 2019Assignee: International Business Machines CorporationInventor: Sudheesh S. Kairali
-
Publication number: 20190199738Abstract: Aspects of the present invention provide an approach for providing network intrusion detection and prevention service (NIDPS) capabilities to a microservice in a networked computing environment. In an embodiment, a set of rules for accessing the microservice is retrieved. A NIDPS microservice is created within the environment of the microservice fabric that supports the microservice using the set of rules. The NIDPS microservice is established as a proxy communications destination for communications to the microservice such that communications that are intended for the microservice are instead rerouted to the NIDPS microservice. These communications are filtered by the NIDPS microservice according to the set of rules (e.g., to remove any communications that are determined to be threats).Type: ApplicationFiled: December 21, 2017Publication date: June 27, 2019Inventors: Vinit Jain, Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Madhuri Madhavan Pillai
-
Publication number: 20190104081Abstract: A method, computer program product, and system includes a processor(s) obtaining historical data related to buffer space usage of a common shared storage resource by a group of j ournals. The processor(s) monitors each journal over repeating temporal periods and determined a predictability for each journal (i.e., predictable or unpredictable. The processor(s) generates usage statics for each journal during each monitored period dependent on whether the journal was predictable or unpredictable during the monitored period. For each monitored period, the processor(s) ranks predictable journals by a buffer space requirement for each journal of the predictable journals. Based on the rankings, the processor(s) determined a buffer space requirement for each journal for a current period, where the current period shares temporal qualities with the given monitored period. The processor(s) allocates, for use during the current period, based on the buffer space requirement, buffer space to each journal.Type: ApplicationFiled: December 27, 2017Publication date: April 4, 2019Inventors: Sudheesh S. KAIRALI, Vijay R. KALANGUMVATHAKKAL, Jagdish KUMAR, Sunil Kumar S. SINGH
-
Publication number: 20190104080Abstract: A method, computer program product, and system includes a processor(s) obtaining historical data related to buffer space usage of a common shared storage resource by a group of journals. The processor(s) monitors each journal over repeating temporal periods and determined a predictability for each journal (i.e., predictable or unpredictable. The processor(s) generates usage statics for each journal during each monitored period dependent on whether the journal was predictable or unpredictable during the monitored period. For each monitored period, the processor(s) ranks predictable journals by a buffer space requirement for each journal of the predictable journals. Based on the rankings, the processor(s) determined a buffer space requirement for each journal for a current period, where the current period shares temporal qualities with the given monitored period. The processor(s) allocates, for use during the current period, based on the buffer space requirement, buffer space to each journal.Type: ApplicationFiled: October 4, 2017Publication date: April 4, 2019Inventors: Sudheesh S. KAIRALI, Vijay R. KALANGUMVATHAKKAL, Jagdish KUMAR, Sunil Kumar S. SINGH
-
Patent number: 10230582Abstract: A method and system are provided. The method includes constructing a dependency graph of cloud resources based on interdependencies between the cloud resources. The dependency graph includes a set of nodes, a set of edges, and a precedence order. Each node corresponds to one of the cloud resources. Each edge corresponds to an association between two of the cloud resources. The precedence order corresponds to a processing order of the nodes. The method further includes applying a set of cleanup rules to each node to determine a cleanup eligibility of any of the cloud resources corresponding to each node. The method also includes removing from the cloud any of the cloud resources determined to be cleanup eligible based on the applying step. The dependency graph is constructed by scanning, in a cloud resource dependency construct, different cloud resource types to be incorporated into the dependency graph.Type: GrantFiled: August 29, 2016Date of Patent: March 12, 2019Assignee: International Business Machines CorporationInventors: Ashish Billore, Sudheesh S. Kairali
-
Publication number: 20180254996Abstract: The system, method, and computer program product described herein provide automatic scaling of resources allocated to microservices based on projected demand data received from consumers of the microservices. In an aspect of the present disclosure, a method for scaling up or down a capacity allocated to a microservice is disclosed. The method includes receiving projected demand data for a microservice from a plurality of consumers, aggregating the projected demand data together, calculating a total projected demand for the microservice for a future period of time based on the aggregated projected demand data, and determining, based at least in part on the total projected demand, whether to scale up or scale down a capacity allocated to the microservice for the future period of time.Type: ApplicationFiled: March 3, 2017Publication date: September 6, 2018Inventors: Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Ayyalaraju C. Koundinya, Rohit S. Shetty
-
Publication number: 20180246741Abstract: A method, executed by a computer, includes receiving, for a cluster, a request to create a new container host, wherein the cluster comprises a plurality of container hosts having a corresponding plurality of local repositories, creating the new container host, selecting an image for the new container host according to one or more host preferences, wherein the image is stored in an image location, and copying the image from the image location to the local repository of the new container host. A computer system and computer program product corresponding to the above method are also disclosed herein.Type: ApplicationFiled: May 3, 2018Publication date: August 30, 2018Inventors: Sudheesh S. Kairali, Neeraj Kumar Kashyap
-
Publication number: 20180196696Abstract: An approach is provided for managing a timeout and polling interval of an operation of an application. A type of the application is received. Based on the type, it is determined that the application requires optimizations of the timeout and polling interval. Whether a data repository includes recommendations of timeout(s) and polling interval(s) for operation(s) of applications of the received type is determined. If the data repository includes the recommendations, a recommendation that specifies the timeout and polling interval is selected from the recommendations and the timeout and polling interval are applied to a deployed image, or if the data repository does not include the recommendations, a user entry of values for an optimal timeout and an optimal polling interval is received and a workload is deployed. The workload has a configuration that includes the values for the optimal timeout and the optimal polling interval.Type: ApplicationFiled: January 6, 2017Publication date: July 12, 2018Inventor: Sudheesh S. Kairali
-
Publication number: 20180191822Abstract: Embodiments of the present invention provide systems and methods for organization of data logging in a networked computing environment. A plurality of logging and monitoring zones, referred to as “logmon” zones are defined. Each zone is associated with one or more policies. The policies specify various parameters such as storage limits, priority, periodicity, and retention time, among others. A networked application operating in a cloud (networked) environment is associated with a zone. The tenant for the application can be billed according to the zone.Type: ApplicationFiled: January 4, 2017Publication date: July 5, 2018Inventors: Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Rohit S. Shetty
-
Patent number: 10013265Abstract: A method, executed by a computer, includes receiving, for a cluster, a request to create a new container host, wherein the cluster comprises a plurality of container hosts having a corresponding plurality of local repositories, creating the new container host, selecting an image for the new container host according to one or more host preferences, wherein the image is stored in an image location, and copying the image from the image location to the local repository of the new container host. A computer system and computer program product corresponding to the above method are also disclosed herein.Type: GrantFiled: June 23, 2016Date of Patent: July 3, 2018Assignee: International Business Machines CorporationInventors: Sudheesh S. Kairali, Neeraj Kumar Kashyap
-
Publication number: 20180157505Abstract: A computer-implemented method is provided. The method includes identifying, by one or more processors, faulty layers from among a plurality of layers of a container image stored in a container-based cloud system. The method further includes storing, by the one or more processors, information regarding the container image and the faulty layers of the container image. The method also includes automatically blacklisting, by the one or more processors, the container image responsive to an identification of one or more of the faulty layers of the container image. The method additionally includes preventing, by the one or more processors, use of any of the faulty layers in a provisioning process in a container-based cloud system.Type: ApplicationFiled: December 1, 2016Publication date: June 7, 2018Inventors: Sudheesh S. Kairali, Neeraj K. Kashyap