Patents by Inventor Swaminathan Balasubramanian

Swaminathan Balasubramanian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160294749
    Abstract: A communication management system. A computer receives an electronic communication including an attachment and selectively forwards components of the attachment to multiple recipients based on associating the recipients with the components.
    Type: Application
    Filed: March 30, 2015
    Publication date: October 6, 2016
    Inventors: Swaminathan Balasubramanian, Ravi P. Bansal, Sandip D. Mahajan, Haaris A. Shaikh
  • Patent number: 9460072
    Abstract: Processing a form in an image is provided. A plurality of data fields is detected within the form in the image. One or more of the data fields that contain private data and a plurality of the data fields that do not contain private data are detected. Contents of the plurality of data fields that do not contain private data are stored as metadata for the image and contents of the one or more data fields that contain private data are not stored as metadata for the image.
    Type: Grant
    Filed: July 16, 2013
    Date of Patent: October 4, 2016
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Andrew R. Jones, Brian M. O'Connell, Keith R. Walker
  • Publication number: 20160277493
    Abstract: In an approach to improving resource downloads, one or more computer processors detect a request to download a resource from an original source to a user's computing device. The one or more computer processors determine a cost of the download of the requested resource from the original source. The one or more computer processors determine whether the cost of the download of the requested resource from the original source exceeds a predefined threshold. The one or more computer processors determine a group of trusted network connected endpoints. The one or more computer processors determine whether the requested resource exists in the group of trusted network connected endpoints. Responsive to determining the requested resource exists in the group of trusted network connected endpoints, the one or more computer processors download the requested resource from at least one of the trusted network connected endpoints.
    Type: Application
    Filed: June 9, 2016
    Publication date: September 22, 2016
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Saswati Maji, Indrajit Poddar
  • Publication number: 20160277376
    Abstract: A processor-implemented method is provided. The method may include providing a content registry with at least one application program interface (API) to manage a plurality of entries stored in the content registry. The method may also include providing access to the plurality of entries by a pre-authorized search engine to the content registry in response to a search requested by an authorized requester.
    Type: Application
    Filed: March 21, 2015
    Publication date: September 22, 2016
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Publication number: 20160277378
    Abstract: A processor-implemented method is provided. The method may include providing a content registry with at least one application program interface (API) to manage a plurality of entries stored in the content registry. The method may also include providing access to the plurality of entries by a pre-authorized search engine to the content registry in response to a search requested by an authorized requester.
    Type: Application
    Filed: October 23, 2015
    Publication date: September 22, 2016
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Indrajit Poddar, Cheranellore Vasudevan
  • Publication number: 20160253174
    Abstract: Embodiments of the present invention provide an approach for integrated development environment (IDE)-based repository searching (e.g., for library elements such as classes and/or functions) in a networked computing environment. In a typical embodiment, a first program code file is received from a first integrated development environment (IDE). The first program file may be associated with a set of attributes as stored in an annotation, header, or the like. Regardless, the first program file may be parsed and indexed into a repository based on the set of attributes. A search request may then be received from a second IDE. Based on the search request and the set of attributes, a matching program code file may then be identified as stored in the repository. Once identified, the matching program code file may be transmitted/communicated to the second IDE to fulfill the search request.
    Type: Application
    Filed: May 6, 2016
    Publication date: September 1, 2016
    Inventors: Swaminathan Balasubramanian, Rick A. Hamilton, II, Brian M. O'Connell, Keith R. Walker
  • Patent number: 9426109
    Abstract: A communication management system. A computer receives an electronic communication including an attachment and selectively forwards components of the attachment to multiple recipients based on associating the recipients with the components.
    Type: Grant
    Filed: March 16, 2016
    Date of Patent: August 23, 2016
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Ravi P. Bansal, Sandip D. Mahajan, Haaris A. Shaikh
  • Patent number: 9420041
    Abstract: In an approach to improving resource downloads, one or more computer processors detect a request to download a resource from an original source to a user's computing device. The one or more computer processors determine a cost of the download of the requested resource from the original source. The one or more computer processors determine whether the cost of the download of the requested resource from the original source exceeds a predefined threshold. The one or more computer processors determine a group of trusted network connected endpoints. The one or more computer processors determine whether the requested resource exists in the group of trusted network connected endpoints. Responsive to determining the requested resource exists in the group of trusted network connected endpoints, the one or more computer processors download the requested resource from at least one of the trusted network connected endpoints.
    Type: Grant
    Filed: February 1, 2016
    Date of Patent: August 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Saswati Maji, Indrajit Poddar
  • Publication number: 20160216964
    Abstract: Approaches presented herein enable correction of source code that fails to comply with an established coding standard in a code base within an Integrated Development Environment (IDE). Specifically, a non-compliant segment of code, which requires correction, and that was coded by a first developer, is assembled into a stand-alone artifact that is dispatched to a second developer. The code segment is then corrected by the second developer, and the artifact containing the corrected segment is merged back into the code base from whence the segment originated. In one approach, the artifact comprises the code segment, dependent code classes of the segment, unit tests results, and test data. In another approach, the second developer is identified utilizing a skill-matching algorithm. In yet another approach, the corrected segment is unit-tested prior to being merged back into the code base.
    Type: Application
    Filed: April 1, 2016
    Publication date: July 28, 2016
    Inventors: Swaminathan Balasubramanian, Radha M. De, Brian M. O'Connell, Keith R. Walker
  • Publication number: 20160203005
    Abstract: One or more processors monitor usage of an application on a first computing device. The one or more processors determine whether the usage of a feature of the application on the first computing device was successful. Responsive to determining that the usage of the feature of the application on the first computing device was not successful, the one or more processors create a usage tip associated with the feature of the application.
    Type: Application
    Filed: March 1, 2016
    Publication date: July 14, 2016
    Inventors: Swaminathan Balasubramanian, Ravi P. Bansal, Rajib Bhattacharya, Sandip D. Mahajan
  • Publication number: 20160203003
    Abstract: One or more processors monitor usage of an application on a first computing device. The one or more processors determine whether the usage of a feature of the application on the first computing device was successful. Responsive to determining that the usage of the feature of the application on the first computing device was not successful, the one or more processors create a usage tip associated with the feature of the application.
    Type: Application
    Filed: January 13, 2015
    Publication date: July 14, 2016
    Inventors: Swaminathan Balasubramanian, Ravi P. Bansal, Rajib Bhattacharya, Sandip D. Mahajan
  • Patent number: 9367304
    Abstract: Embodiments of the present invention provide an approach for integrated development environment (IDE)-based repository searching (e.g., for library elements such as classes and/or functions) in a networked computing environment. In a typical embodiment, a first program code file is received from a first integrated development environment (IDE). The first program file may be associated with a set of attributes as stored in an annotation, header, or the like. Regardless, the first program file may be parsed and indexed into a repository based on the set of attributes. A search request may then be received from a second IDE. Based on the search request and the set of attributes, a matching program code file may then be identified as stored in the repository. Once identified, the matching program code file may be transmitted/communicated to the second IDE to fulfill the search request.
    Type: Grant
    Filed: May 6, 2015
    Date of Patent: June 14, 2016
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Rick A. Hamilton, II, Brian M. O'Connell, Keith R. Walker
  • Publication number: 20160150007
    Abstract: In an approach to improving resource downloads, one or more computer processors detect a request to download a resource from an original source to a user's computing device. The one or more computer processors determine a cost of the download of the requested resource from the original source. The one or more computer processors determine whether the cost of the download of the requested resource from the original source exceeds a predefined threshold. The one or more computer processors determine a group of trusted network connected endpoints. The one or more computer processors determine whether the requested resource exists in the group of trusted network connected endpoints. Responsive to determining the requested resource exists in the group of trusted network connected endpoints, the one or more computer processors download the requested resource from at least one of the trusted network connected endpoints.
    Type: Application
    Filed: February 1, 2016
    Publication date: May 26, 2016
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Saswati Maji, Indrajit Poddar
  • Patent number: 9348562
    Abstract: Approaches presented herein enable correction of source code that fails to comply with an established coding standard in a code base within an Integrated Development Environment (IDE). Specifically, a non-compliant segment of code, which requires correction, and that was coded by a first developer, is assembled into a stand-alone artifact that is dispatched to a second developer. The code segment is then corrected by the second developer, and the artifact containing the corrected segment is merged back into the code base from whence the segment originated. In one approach, the artifact comprises the code segment, dependent code classes of the segment, unit tests results, and test data. In another approach, the second developer is identified utilizing a skill-matching algorithm. In yet another approach, the corrected segment is unit-tested prior to being merged back into the code base.
    Type: Grant
    Filed: August 25, 2014
    Date of Patent: May 24, 2016
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Radha M. De, Brian M. O'Connell, Keith R. Walker
  • Publication number: 20160119290
    Abstract: Programmable devices selectively allocate file content portions between cloud and secured hardware device storage mediums. A confidential portion of a first file is stored as a second file on a first device, and a remainder portion of content of the first file that is different from the confidential portion and is not designated as confidential is stored on a cloud storage system. A uniform resource indicator is generated that includes a routing identifier to the first device, and a section routing identifier to the second file stored on the first device. A revised version of the first file is stored to the cloud storage system wherein the confidential portion of the first file is replaced with the generated uniform resource indicator within the revised version of the first file at a location of the confidential portion within the content of the first file.
    Type: Application
    Filed: October 23, 2014
    Publication date: April 28, 2016
    Inventors: Swaminathan Balasubramanian, Brian M. O'Connell, Cheranellore Vasudevan, Keith R. Walker
  • Publication number: 20160094653
    Abstract: In an approach to improving resource downloads, one or more computer processors detect a request to download a resource from an original source to a user's computing device. The one or more computer processors determine a cost of the download of the requested resource from the original source. The one or more computer processors determine whether the cost of the download of the requested resource from the original source exceeds a predefined threshold. The one or more computer processors determine a group of trusted network connected endpoints. The one or more computer processors determine whether the requested resource exists in the group of trusted network connected endpoints. Responsive to determining the requested resource exists in the group of trusted network connected endpoints, the one or more computer processors download the requested resource from at least one of the trusted network connected endpoints.
    Type: Application
    Filed: September 30, 2014
    Publication date: March 31, 2016
    Inventors: Swaminathan Balasubramanian, Radha M. De, Ashley D. Delport, Saswati Maji, Indrajit Poddar
  • Publication number: 20160094568
    Abstract: An approach for responding to a threat in a networked computing environment (e.g., a cloud computing environment) is provided. In an embodiment, a set of associations to a virtual machine (VM) instance are established, each association indicating a relationship between the VM instance and a related VM instance. Each of the associations in the set of associations is assigned a strength attribute. When a threat is detected in a VM instance, a first preventative measure is performed on a first related VM instance, the strength of which is determined based on the strength attribute that corresponds to the association between the VM instance and the first related VM instance. A second preventative measure is performed on a second related VM instance, the strength of which is based on the strength attribute that corresponds to the association between the VM instance and the second related VM instance.
    Type: Application
    Filed: September 25, 2014
    Publication date: March 31, 2016
    Inventors: Swaminathan Balasubramanian, Matthew M. Lobbes, Brian M. O'Connell, Brian J. Snitzer
  • Publication number: 20160065518
    Abstract: A method according to one embodiment is for transmitting a message. In one embodiment, one or more processor of a messaging system identifies a certain message of the messaging system, the certain message being a blocked message intended for transmission to a certain user of the messaging system. In one embodiment, the one or more processor further determines one or more of a popularity of content of the certain message and a relevance of content of the certain message to the certain user, the certain user being a prospective recipient of a message. In one embodiment, the one or more processor transmits a message to the certain user responsively to a result of the determining of the one or more of a popularity of content of the certain message and a relevance of content of the certain message to the certain user of the messaging system.
    Type: Application
    Filed: November 12, 2015
    Publication date: March 3, 2016
    Applicant: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Ravi P. Bansal, Andrew R. Jones, Brian M. O'Connell
  • Publication number: 20160054983
    Abstract: Approaches presented herein enable correction of source code that fails to comply with an established coding standard in a code base within an Integrated Development Environment (IDE). Specifically, a non-compliant segment of code, which requires correction, and that was coded by a first developer, is assembled into a stand-alone artifact that is dispatched to a second developer. The code segment is then corrected by the second developer, and the artifact containing the corrected segment is merged back into the code base from whence the segment originated. In one approach, the artifact comprises the code segment, dependent code classes of the segment, unit tests results, and test data. In another approach, the second developer is identified utilizing a skill-matching algorithm. In yet another approach, the corrected segment is unit-tested prior to being merged back into the code base.
    Type: Application
    Filed: August 25, 2014
    Publication date: February 25, 2016
    Inventors: Swaminathan Balasubramanian, Radha M. De, Brian M. O'Connell, Keith R. Walker
  • Patent number: 9262546
    Abstract: Exemplary embodiments of the present invention disclose a method and system for configuring a web browser executing in a computer to render a web page for display at the computer. A first hyperlink request is received from a first program executing in the computer to obtain and render a first web page corresponding to the first hyperlink. In response, the web browser obtains the first web page, and renders the first web page according to a first set of web page configuration parameters. A second hyperlink request is received from a second program executing in the computer to obtain and render a second web page corresponding to the second hyperlink. In response, the web browser obtains the second web page, and renders the second web page according to a second set of web page configuration parameters that differs in part from the first set of web page configuration parameters.
    Type: Grant
    Filed: November 26, 2012
    Date of Patent: February 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Swaminathan Balasubramanian, Rick A. Hamilton, II, Brian M. O'Connell, Keith R. Walker