Patents by Inventor Sumedh Wasudeo Sathaye

Sumedh Wasudeo Sathaye has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11966782
    Abstract: Techniques described herein relate to a method for performing state management services for composed information handling systems. The method includes determining that at least one control resource set is not associated with a distributed state storage system; instantiating the distributed state storage system using first additional computing resources; registering the at least one control resource set with the distributed state storage system; preparing the at least one control resource set to perform a first portion of the state management services using the distributed state storage system; determining that the at least one control resource set is not associated with an audit storage; instantiating the audit storage using second additional computing resources; registering the at least one control resource set with the audit storage; and preparing the at least one control resource set to perform a second portion of the state management services using the audit storage.
    Type: Grant
    Filed: September 24, 2021
    Date of Patent: April 23, 2024
    Assignee: Dell Products L.P.
    Inventors: Douglas L. Farley, John S. Harwood, Jimmy Doyle Pike, Gaurav Chawla, Tommi Salli, Robert Anthony Lincourt, Jr., Sumedh Wasudeo Sathaye
  • Patent number: 11755374
    Abstract: A cloud resource audit system includes a plurality of datacenter hardware resources and a cloud resource management controller that is coupled to the plurality of datacenter hardware resources and that allocates a first portion of the plurality of datacenter hardware resources to run one or more workloads for a first end user on the first portion of the plurality of datacenter hardware resources. The cloud resource management controller then executes a first set of audit instructions to performs a first audit action on one or more datacenter hardware resources included in the first portion of the plurality of datacenter hardware resources, and provides, in response to the first set of audit instructions being executed and the first audit action being performed, a first set of audit results to an audit terminal device.
    Type: Grant
    Filed: May 26, 2020
    Date of Patent: September 12, 2023
    Assignee: Dell Products L.P.
    Inventors: Sumedh Wasudeo Sathaye, Nakul Shrivastava
  • Publication number: 20230206249
    Abstract: Techniques described herein relate to a method for performing interception and auditing services for composed information handling systems. The method includes obtaining, by a system control processor manager, a request to perform interception and auditing from a user; and in response to obtaining the request: identifying an interception and auditing intent associated with the request; making a determination that the user is authorized to perform the interception and auditing intent; in response to the determination: identifying a composed system associated with the request; setting up interception and auditing services using an interception and auditing policy and function repository based on the intent; and initiating performance of the interception and auditing services using an at least one control resource set of the composed system.
    Type: Application
    Filed: December 27, 2021
    Publication date: June 29, 2023
    Inventors: Sumedh Wasudeo Sathaye, Gaurav Chawla
  • Publication number: 20230102403
    Abstract: Techniques described herein relate to a method for performing state management services for composed information handling systems. The method includes making a determination that an at least one control resource set is not associated with a distributed state storage system; and in response to the determination: identifying additional computing resources to instantiate a distributed state storage system; instantiating the distributed state storage system using the additional computing resources; registering the at least one control resource set with the distributed state storage system; and preparing the at least one control resource set to perform at state management services using the distributed state storage system.
    Type: Application
    Filed: September 24, 2021
    Publication date: March 30, 2023
    Inventors: Douglas L. Farley, John S. Harwood, Jimmy Doyle Pike, Gaurav Chawla, Tommi Salli, Robert Anthony Lincourt, JR., Sumedh Wasudeo Sathaye
  • Publication number: 20230099310
    Abstract: Techniques described herein relate to a method for performing state management services for composed information handling systems. The method includes determining that at least one control resource set is not associated with a distributed state storage system; instantiating the distributed state storage system using first additional computing resources; registering the at least one control resource set with the distributed state storage system; preparing the at least one control resource set to perform a first portion of the state management services using the distributed state storage system; determining that the at least one control resource set is not associated with an audit storage; instantiating the audit storage using second additional computing resources; registering the at least one control resource set with the audit storage; and preparing the at least one control resource set to perform a second portion of the state management services using the audit storage.
    Type: Application
    Filed: September 24, 2021
    Publication date: March 30, 2023
    Inventors: Douglas L. Farley, John S. Harwood, Jimmy Doyle Pike, Gaurav Chawla, Tommi Salli, Robert Anthony Lincourt, JR., Sumedh Wasudeo Sathaye
  • Publication number: 20230081147
    Abstract: A method for providing bare-metal (BMS) resources includes receiving, by a system control processor, a partitioning request from a system control processor manager that specify a quantity of physical partitions, in response to the partitioning request: identifying a set of physical partitions of a bare-metal system (BMS) that are capable of servicing the partitioning request based on the quantity of physical partitions, updating a partitioning configuration data structure based on the set of physical partitions and the virtual partition, and implementing the virtual partition based on the set of resources using the partitioning configuration data structure.
    Type: Application
    Filed: September 10, 2021
    Publication date: March 16, 2023
    Inventors: Sumedh Wasudeo Sathaye, Gaurav Chawla, John S. Harwood
  • Publication number: 20210373950
    Abstract: A cloud resource audit system includes a plurality of datacenter hardware resources and a cloud resource management controller that is coupled to the plurality of datacenter hardware resources and that allocates a first portion of the plurality of datacenter hardware resources to run one or more workloads for a first end user on the first portion of the plurality of datacenter hardware resources. The cloud resource management controller then executes a first set of audit instructions to performs a first audit action on one or more datacenter hardware resources included in the first portion of the plurality of datacenter hardware resources, and provides, in response to the first set of audit instructions being executed and the first audit action being performed, a first set of audit results to an audit terminal device.
    Type: Application
    Filed: May 26, 2020
    Publication date: December 2, 2021
    Inventors: Sumedh Wasudeo Sathaye, Nakul Shrivastava
  • Patent number: 11093424
    Abstract: A rack switch coupling system includes a plurality of computing devices that are positioned in a rack in a stacked orientation. Each of the plurality of computing devices includes a top surface that corresponds with a first plane associated with that computing device, and a bottom surface that is located opposite that computing device from the top surface and that corresponds with a second plane associated with that computing device. The rack switch coupling system also includes a switch system that is positioned in the rack and that includes respective ports cabled to each of the plurality of computing devices, with each of the respective ports located adjacent the computing device to which it is cabled and between the first plane and the second plane associated with that computing device.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: August 17, 2021
    Assignee: Dell Products L.P.
    Inventors: Victor Teeter, Shree Rathinasamy, Sumedh Wasudeo Sathaye
  • Publication number: 20210232518
    Abstract: A rack switch coupling system includes a plurality of computing devices that are positioned in a rack in a stacked orientation. Each of the plurality of computing devices includes a top surface that corresponds with a first plane associated with that computing device, and a bottom surface that is located opposite that computing device from the top surface and that corresponds with a second plane associated with that computing device. The rack switch coupling system also includes a switch system that is positioned in the rack and that includes respective ports cabled to each of the plurality of computing devices, with each of the respective ports located adjacent the computing device to which it is cabled and between the first plane and the second plane associated with that computing device.
    Type: Application
    Filed: January 28, 2020
    Publication date: July 29, 2021
    Inventors: Victor Teeter, Shree Rathinasamy, Sumedh Wasudeo Sathaye
  • Patent number: 9460302
    Abstract: Described herein are techniques related to shielding data in transit and in memory. A method and system for shielding data in transit and in memory may include using a transformation knowledge key (TKK). For shielding data in transit, the TKK is configured to include a splitting algorithm component that is configured to split a message into N segments of shielded data and route the N segments via M communications paths, where M and N are integers greater than 1. For shielding data in memory, the memory is segmented into M memory blocks. The splitting algorithm component of the TKK is configured to split data into N segments of shielded data and store the N segments of shielded data in the M memory blocks. The TKK is reused to unshield and reconstruct the original message or the data from the N segments of shielded data.
    Type: Grant
    Filed: December 12, 2014
    Date of Patent: October 4, 2016
    Assignee: Cofactor Computing LLC
    Inventors: Sumedh Wasudeo Sathaye, Nitin Sadashiv Deshmukh
  • Patent number: 9336363
    Abstract: Described herein are techniques related to shielding data, thereby enabling the shielded data to be distributively placed in untrusted computing environments for cost effective storage. A method and system may include a trusted agent operable in a trusted computing environment. The trusted agent includes a transformation knowledge key generator and a data transformer. The transformation knowledge key generator is operable to generate a transformation knowledge key, the transformation knowledge key being generated with at least two shielding algorithms to shield the data. The data transformer is operable to transform the data into N segments of shielded data using the transformation knowledge key. A communications agent securely coupled to the trusted agent is operable to securely transfer one or more of the N segments of shielded data to one or more storage devices in untrusted computing environments.
    Type: Grant
    Filed: January 21, 2014
    Date of Patent: May 10, 2016
    Assignee: Cofactor Computing LLC
    Inventors: Sumedh Wasudeo Sathaye, Nitin Sadashiv Deshmukh
  • Patent number: 9209971
    Abstract: Described herein are techniques related to shielding data. A method and system for generating a transformation knowledge key (TKK) may include a TKK generator operable to generate a TKK used to shield the data. The TKK is configured to include at least two components. A library of shielding algorithms is configured to include at least two types of shielding algorithms. The TKK generator is configured to select the at least two types of shielding algorithms to generate the at least two components. The TKK generator is operable to concatenate the at least two components in a configurable order to generate the TKK.
    Type: Grant
    Filed: January 21, 2014
    Date of Patent: December 8, 2015
    Assignee: Cofactor Computing LLC
    Inventors: Sumedh Wasudeo Sathaye, Nitin Sadashiv Deshmukh
  • Publication number: 20150205939
    Abstract: Described herein are techniques related to shielding data, thereby enabling the shielded data to be distributively placed in untrusted computing environments for cost effective storage. A method and system may include a trusted agent operable in a trusted computing environment. The trusted agent includes a transformation knowledge key generator and a data transformer. The transformation knowledge key generator is operable to generate a transformation knowledge key, the transformation knowledge key being generated with at least two shielding algorithms to shield the data. The data transformer is operable to transform the data into N segments of shielded data using the transformation knowledge key. A communications agent securely coupled to the trusted agent is operable to securely transfer one or more of the N segments of shielded data to one or more storage devices in untrusted computing environments.
    Type: Application
    Filed: January 21, 2014
    Publication date: July 23, 2015
    Applicant: COFACTOR COMPUTING LLC
    Inventors: Sumedh Wasudeo Sathaye, Nitin Sadashiv Deshmukh
  • Publication number: 20150207625
    Abstract: Described herein are techniques related to shielding data. A method and system for generating a transformation knowledge key (TKK) may include a TKK generator operable to generate a TKK used to shield the data. The TKK is configured to include at least two components. A library of shielding algorithms is configured to include at least two types of shielding algorithms. The TKK generator is configured to select the at least two types of shielding algorithms to generate the at least two components. The TKK generator is operable to concatenate the at least two components in a configurable order to generate the TKK.
    Type: Application
    Filed: January 21, 2014
    Publication date: July 23, 2015
    Applicant: COFACTOR COMPUTING LLC
    Inventors: Sumedh Wasudeo Sathaye, Nitin Sadashiv Deshmukh
  • Publication number: 20150207785
    Abstract: Described herein are techniques related to shielding data in transit and in memory. A method and system for shielding data in transit and in memory may include using a transformation knowledge key (TKK). For shielding data in transit, the TKK is configured to include a splitting algorithm component that is configured to split a message into N segments of shielded data and route the N segments via M communications paths, where M and N are integers greater than 1. For shielding data in memory, the memory is segmented into M memory blocks. The splitting algorithm component of the TKK is configured to split data into N segments of shielded data and store the N segments of shielded data in the M memory blocks. The TKK is reused to unshield and reconstruct the original message or the data from the N segments of shielded data.
    Type: Application
    Filed: December 12, 2014
    Publication date: July 23, 2015
    Inventors: Sumedh Wasudeo Sathaye, Nitin Sadashiv Deshmukh
  • Patent number: 7953588
    Abstract: A method (and system) for emulating a target system's memory addressing using a virtual-to-real memory mapping mechanism of a host multiprocessor system's operating system, includes inputting a target virtual memory address into a simulated page table to obtain a host virtual memory address. The target system is oblivious to the software it is running on.
    Type: Grant
    Filed: September 17, 2002
    Date of Patent: May 31, 2011
    Assignee: International Business Machines Corporation
    Inventors: Erik Richter Altman, Ravi Nair, John Kevin O'Brien, Kathryn Mary O'Brien, Peter Howland Oden, Daniel Arthur Prener, Sumedh Wasudeo Sathaye
  • Patent number: 7844446
    Abstract: A method (and system) for executing a multiprocessor program written for a target instruction set architecture on a host computing system having a plurality of processors designed to process instructions of a second instruction set architecture, includes representing each portion of the program designed to run on a processor of the target computing system as one or more program threads to be executed on the host computing system.
    Type: Grant
    Filed: February 19, 2009
    Date of Patent: November 30, 2010
    Assignee: International Business Machines Corporation
    Inventors: Erik Richter Altman, Ravi Nair, John Kevin O'Brien, Kathryn Mary O'Brien, Peter Howland Oden, Daniel Arthur Prener, Sumedh Wasudeo Sathaye
  • Publication number: 20090157377
    Abstract: A method (and system) for executing a multiprocessor program written for a target instruction set architecture on a host computing system having a plurality of processors designed to process instructions of a second instruction set architecture, includes representing each portion of the program designed to run on a processor of the target computing system as one or more program threads to be executed on the host computing system.
    Type: Application
    Filed: February 19, 2009
    Publication date: June 18, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Erik Richter Altman, Ravi Nair, John Kevin O'Brien, Kathryn Mary O'Brien, Peter Howland Oden, Daniel Arthur Prener, Sumedh Wasudeo Sathaye
  • Patent number: 7496733
    Abstract: A pipeline system and method includes a plurality of operational stages. The stages include a pointer register stage which stores pointer information and updates, and a rename and dependence checking stage located downstream of the pointer register stage, which renames registers and determines if dependencies exist. A functional unit provides pointer information updates to the pointer register stage such that pointer information is processed and updated to the pointer register stage before or in parallel with the register dependency checking.
    Type: Grant
    Filed: October 26, 2007
    Date of Patent: February 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Erik Altman, Michael Karl Gschwind, Jude A. Rivers, Sumedh Wasudeo Sathaye, John-David Wellman, Victor Zyuban
  • Patent number: 7496494
    Abstract: A method (and system) for executing a multiprocessor program written for a target instruction set architecture on a host computing system having a plurality of processors designed to process instructions of a second instruction set architecture, includes representing each portion of the program designed to run on a processor of the target computing system as one or more program threads to be executed on the host computing system.
    Type: Grant
    Filed: September 17, 2002
    Date of Patent: February 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Erik Richter Altman, Ravi Nair, John Kevin O'Brien, Kathryn Mary O'Brien, Peter Howland Oden, Daniel Arthur Prener, Sumedh Wasudeo Sathaye