Patents by Inventor Sudheesh S. Kairali

Sudheesh S. Kairali has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200092224
    Abstract: A method, computer program product, and system includes a processor(s) obtaining historical data related to buffer space usage of a common shared storage resource by a group of journals. The processor(s) monitors each journal over repeating temporal periods and determined a predictability for each journal (i.e., predictable or unpredictable. The processor(s) generates usage statics for each journal during each monitored period dependent on whether the journal was predictable or unpredictable during the monitored period. For each monitored period, the processor(s) ranks predictable journals by a buffer space requirement for each journal of the predictable journals. Based on the rankings, the processor(s) determined a buffer space requirement for each journal for a current period, where the current period shares temporal qualities with the given monitored period. The processor(s) allocates, for use during the current period, based on the buffer space requirement, buffer space to each journal.
    Type: Application
    Filed: November 22, 2019
    Publication date: March 19, 2020
    Inventors: Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Jagdish Kumar, Sunil Kumar S. Singh
  • Patent number: 10574527
    Abstract: As disclosed herein a computer-implemented method includes providing a plurality of resource allocation zones corresponding to a plurality of overcommit policies. The method further includes receiving a request for a resource for a tenant, and determining a selected overcommit policy corresponding to an anticipated resource need. The method further includes selecting a resource allocation zone for the tenant from the plurality of resource allocation zones, and providing the resource to the tenant. A computer program product and a computer system corresponding to the above method are also disclosed herein.
    Type: Grant
    Filed: May 9, 2016
    Date of Patent: February 25, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ashish Billore, Sudheesh S. Kairali
  • Patent number: 10567305
    Abstract: A method, computer program product, and system includes a processor(s) obtaining historical data related to buffer space usage of a common shared storage resource by a group of journals. The processor(s) monitors each journal over repeating temporal periods and determined a predictability for each journal (i.e., predictable or unpredictable. The processor(s) generates usage statics for each journal during each monitored period dependent on whether the journal was predictable or unpredictable during the monitored period. For each monitored period, the processor(s) ranks predictable journals by a buffer space requirement for each journal of the predictable journals. Based on the rankings, the processor(s) determined a buffer space requirement for each journal for a current period, where the current period shares temporal qualities with the given monitored period. The processor(s) allocates, for use during the current period, based on the buffer space requirement, buffer space to each journal.
    Type: Grant
    Filed: December 27, 2017
    Date of Patent: February 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Jagdish Kumar, Sunil Kumar S. Singh
  • Patent number: 10560396
    Abstract: A method, computer program product, and system includes a processor(s) obtaining historical data related to buffer space usage of a common shared storage resource by a group of journals. The processor(s) monitors each journal over repeating temporal periods and determined a predictability for each journal (i.e., predictable or unpredictable. The processor(s) generates usage statics for each journal during each monitored period dependent on whether the journal was predictable or unpredictable during the monitored period. For each monitored period, the processor(s) ranks predictable journals by a buffer space requirement for each journal of the predictable journals. Based on the rankings, the processor(s) determined a buffer space requirement for each journal for a current period, where the current period shares temporal qualities with the given monitored period. The processor(s) allocates, for use during the current period, based on the buffer space requirement, buffer space to each journal.
    Type: Grant
    Filed: October 4, 2017
    Date of Patent: February 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Jagdish Kumar, Sunil Kumar S. Singh
  • Publication number: 20200045068
    Abstract: Aspects of the present invention provide an approach for providing network intrusion detection and prevention service (NIDPS) capabilities to a microservice in a networked computing environment. In an embodiment, a set of rules for accessing the microservice is retrieved. A NIDPS microservice is created within the environment of the microservice fabric that supports the microservice using the set of rules. The NIDPS microservice is established as a proxy communications destination for communications to the microservice such that communications that are intended for the microservice are instead rerouted to the NIDPS microservice. These communications are filtered by the NIDPS microservice according to the set of rules (e.g., to remove any communications that are determined to be threats).
    Type: Application
    Filed: October 14, 2019
    Publication date: February 6, 2020
    Inventors: Vinit Jain, Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Madhuri Madhavan Pillai
  • Patent number: 10554675
    Abstract: Aspects of the present invention provide an approach for providing network intrusion detection and prevention service (NIDPS) capabilities to a microservice in a networked computing environment. In an embodiment, a set of rules for accessing the microservice is retrieved. A NIDPS microservice is created within the environment of the microservice fabric that supports the microservice using the set of rules. The NIDPS microservice is established as a proxy communications destination for communications to the microservice such that communications that are intended for the microservice are instead rerouted to the NIDPS microservice. These communications are filtered by the NIDPS microservice according to the set of rules (e.g., to remove any communications that are determined to be threats).
    Type: Grant
    Filed: December 21, 2017
    Date of Patent: February 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Vinit Jain, Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Madhuri Madhavan Pillai
  • Publication number: 20190372785
    Abstract: A computer-implemented method for distributing digital certificates. A request for a digital certificate is received from a requesting system. A deployment challenge is sent to the trust agent running on the requesting system. A response to the deployment challenge is received from the trust agent running on the requesting system. The response to the deployment challenge is evaluated to determine whether the response is correct. The digital certificate is distributed to the requesting system in response to a determination that the response to the deployment challenge is correct.
    Type: Application
    Filed: August 13, 2019
    Publication date: December 5, 2019
    Inventors: Karunakar Bojjireddy, Sreekanth Ramakrishna Iyer, Sudheesh S. Kairali, Vijay Kalangumvathakkal, Nataraj Nagaratnam, Gal Shachor
  • Publication number: 20190310887
    Abstract: An approach is provided for managing a timeout and polling interval of an operation of an application. A recommendation specifying the timeout and polling interval is selected. The timeout and polling interval are applied to a deployed image. Based on polling intervals, numbers of polls for operations, identifications of the operations, and environments of the operations, a minimum number of polls of the operation in an environment before a successful completion of the operation is determined and an old polling interval used between the polls of the operation is determined. If the minimum number of polls is greater than one, the polling interval specified in the recommendation is determined as the minimum number of polls multiplied by the old polling interval. If the minimum number of polls equals one, the polling interval specified in the recommendation is determined by decreasing the old polling interval by a configurable factor.
    Type: Application
    Filed: June 21, 2019
    Publication date: October 10, 2019
    Inventor: Sudheesh S. Kairali
  • Publication number: 20190268166
    Abstract: A computer-implemented method, system, and non-transitory computer program product for distributing digital certificates. A request for a digital certificate is received from a requesting system. A deployment challenge is sent to the trust agent running on the requesting system. A response to the deployment challenge is received from the trust agent running on the requesting system. The response to the deployment challenge is evaluated to determine whether the response is correct. The digital certificate is distributed to the requesting system in response to a determination that the response to the deployment challenge is correct.
    Type: Application
    Filed: February 23, 2018
    Publication date: August 29, 2019
    Inventors: Karunakar Bojjireddy, Sreekanth Ramakrishna Iyer, Sudheesh S. Kairali, Vijay Kalangumvathakkal, Nataraj Nagaratnam, Gal Shachor
  • Patent number: 10372496
    Abstract: An approach is provided for managing a timeout and polling interval of an operation of an application. A type of the application is received. Based on the type, it is determined that the application requires optimizations of the timeout and polling interval. Whether a data repository includes recommendations of timeout(s) and polling interval(s) for operation(s) of applications of the received type is determined. If the data repository includes the recommendations, a recommendation that specifies the timeout and polling interval is selected from the recommendations and the timeout and polling interval are applied to a deployed image, or if the data repository does not include the recommendations, a user entry of values for an optimal timeout and an optimal polling interval is received and a workload is deployed. The workload has a configuration that includes the values for the optimal timeout and the optimal polling interval.
    Type: Grant
    Filed: January 6, 2017
    Date of Patent: August 6, 2019
    Assignee: International Business Machines Corporation
    Inventor: Sudheesh S. Kairali
  • Publication number: 20190199738
    Abstract: Aspects of the present invention provide an approach for providing network intrusion detection and prevention service (NIDPS) capabilities to a microservice in a networked computing environment. In an embodiment, a set of rules for accessing the microservice is retrieved. A NIDPS microservice is created within the environment of the microservice fabric that supports the microservice using the set of rules. The NIDPS microservice is established as a proxy communications destination for communications to the microservice such that communications that are intended for the microservice are instead rerouted to the NIDPS microservice. These communications are filtered by the NIDPS microservice according to the set of rules (e.g., to remove any communications that are determined to be threats).
    Type: Application
    Filed: December 21, 2017
    Publication date: June 27, 2019
    Inventors: Vinit Jain, Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Madhuri Madhavan Pillai
  • Publication number: 20190104081
    Abstract: A method, computer program product, and system includes a processor(s) obtaining historical data related to buffer space usage of a common shared storage resource by a group of j ournals. The processor(s) monitors each journal over repeating temporal periods and determined a predictability for each journal (i.e., predictable or unpredictable. The processor(s) generates usage statics for each journal during each monitored period dependent on whether the journal was predictable or unpredictable during the monitored period. For each monitored period, the processor(s) ranks predictable journals by a buffer space requirement for each journal of the predictable journals. Based on the rankings, the processor(s) determined a buffer space requirement for each journal for a current period, where the current period shares temporal qualities with the given monitored period. The processor(s) allocates, for use during the current period, based on the buffer space requirement, buffer space to each journal.
    Type: Application
    Filed: December 27, 2017
    Publication date: April 4, 2019
    Inventors: Sudheesh S. KAIRALI, Vijay R. KALANGUMVATHAKKAL, Jagdish KUMAR, Sunil Kumar S. SINGH
  • Publication number: 20190104080
    Abstract: A method, computer program product, and system includes a processor(s) obtaining historical data related to buffer space usage of a common shared storage resource by a group of journals. The processor(s) monitors each journal over repeating temporal periods and determined a predictability for each journal (i.e., predictable or unpredictable. The processor(s) generates usage statics for each journal during each monitored period dependent on whether the journal was predictable or unpredictable during the monitored period. For each monitored period, the processor(s) ranks predictable journals by a buffer space requirement for each journal of the predictable journals. Based on the rankings, the processor(s) determined a buffer space requirement for each journal for a current period, where the current period shares temporal qualities with the given monitored period. The processor(s) allocates, for use during the current period, based on the buffer space requirement, buffer space to each journal.
    Type: Application
    Filed: October 4, 2017
    Publication date: April 4, 2019
    Inventors: Sudheesh S. KAIRALI, Vijay R. KALANGUMVATHAKKAL, Jagdish KUMAR, Sunil Kumar S. SINGH
  • Patent number: 10230582
    Abstract: A method and system are provided. The method includes constructing a dependency graph of cloud resources based on interdependencies between the cloud resources. The dependency graph includes a set of nodes, a set of edges, and a precedence order. Each node corresponds to one of the cloud resources. Each edge corresponds to an association between two of the cloud resources. The precedence order corresponds to a processing order of the nodes. The method further includes applying a set of cleanup rules to each node to determine a cleanup eligibility of any of the cloud resources corresponding to each node. The method also includes removing from the cloud any of the cloud resources determined to be cleanup eligible based on the applying step. The dependency graph is constructed by scanning, in a cloud resource dependency construct, different cloud resource types to be incorporated into the dependency graph.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: March 12, 2019
    Assignee: International Business Machines Corporation
    Inventors: Ashish Billore, Sudheesh S. Kairali
  • Publication number: 20180254996
    Abstract: The system, method, and computer program product described herein provide automatic scaling of resources allocated to microservices based on projected demand data received from consumers of the microservices. In an aspect of the present disclosure, a method for scaling up or down a capacity allocated to a microservice is disclosed. The method includes receiving projected demand data for a microservice from a plurality of consumers, aggregating the projected demand data together, calculating a total projected demand for the microservice for a future period of time based on the aggregated projected demand data, and determining, based at least in part on the total projected demand, whether to scale up or scale down a capacity allocated to the microservice for the future period of time.
    Type: Application
    Filed: March 3, 2017
    Publication date: September 6, 2018
    Inventors: Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Ayyalaraju C. Koundinya, Rohit S. Shetty
  • Publication number: 20180246741
    Abstract: A method, executed by a computer, includes receiving, for a cluster, a request to create a new container host, wherein the cluster comprises a plurality of container hosts having a corresponding plurality of local repositories, creating the new container host, selecting an image for the new container host according to one or more host preferences, wherein the image is stored in an image location, and copying the image from the image location to the local repository of the new container host. A computer system and computer program product corresponding to the above method are also disclosed herein.
    Type: Application
    Filed: May 3, 2018
    Publication date: August 30, 2018
    Inventors: Sudheesh S. Kairali, Neeraj Kumar Kashyap
  • Publication number: 20180196696
    Abstract: An approach is provided for managing a timeout and polling interval of an operation of an application. A type of the application is received. Based on the type, it is determined that the application requires optimizations of the timeout and polling interval. Whether a data repository includes recommendations of timeout(s) and polling interval(s) for operation(s) of applications of the received type is determined. If the data repository includes the recommendations, a recommendation that specifies the timeout and polling interval is selected from the recommendations and the timeout and polling interval are applied to a deployed image, or if the data repository does not include the recommendations, a user entry of values for an optimal timeout and an optimal polling interval is received and a workload is deployed. The workload has a configuration that includes the values for the optimal timeout and the optimal polling interval.
    Type: Application
    Filed: January 6, 2017
    Publication date: July 12, 2018
    Inventor: Sudheesh S. Kairali
  • Publication number: 20180191822
    Abstract: Embodiments of the present invention provide systems and methods for organization of data logging in a networked computing environment. A plurality of logging and monitoring zones, referred to as “logmon” zones are defined. Each zone is associated with one or more policies. The policies specify various parameters such as storage limits, priority, periodicity, and retention time, among others. A networked application operating in a cloud (networked) environment is associated with a zone. The tenant for the application can be billed according to the zone.
    Type: Application
    Filed: January 4, 2017
    Publication date: July 5, 2018
    Inventors: Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Rohit S. Shetty
  • Patent number: 10013265
    Abstract: A method, executed by a computer, includes receiving, for a cluster, a request to create a new container host, wherein the cluster comprises a plurality of container hosts having a corresponding plurality of local repositories, creating the new container host, selecting an image for the new container host according to one or more host preferences, wherein the image is stored in an image location, and copying the image from the image location to the local repository of the new container host. A computer system and computer program product corresponding to the above method are also disclosed herein.
    Type: Grant
    Filed: June 23, 2016
    Date of Patent: July 3, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sudheesh S. Kairali, Neeraj Kumar Kashyap
  • Publication number: 20180157505
    Abstract: A computer-implemented method is provided. The method includes identifying, by one or more processors, faulty layers from among a plurality of layers of a container image stored in a container-based cloud system. The method further includes storing, by the one or more processors, information regarding the container image and the faulty layers of the container image. The method also includes automatically blacklisting, by the one or more processors, the container image responsive to an identification of one or more of the faulty layers of the container image. The method additionally includes preventing, by the one or more processors, use of any of the faulty layers in a provisioning process in a container-based cloud system.
    Type: Application
    Filed: December 1, 2016
    Publication date: June 7, 2018
    Inventors: Sudheesh S. Kairali, Neeraj K. Kashyap