Patents by Inventor Vinod Durairaj
Vinod Durairaj has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11874851Abstract: Embodiments for providing end-to-end automated contextual and differentiated application level replication by dynamically creating replication profiles for asynchronous or synchronous replication at runtime to maintain any relevant service level agreement requirements. Based on relevant operating information, data sources are identified as critical and non-critical servers and their data is tagged accordingly in the replication application by using an analytics engine. The information and tags are used to produce a trained model for machine learning processes that can generated predictions for future replication operations. An error handler identifies erroneous predictions and provides a fallback mechanism to avoid any customer replication service level agreement breach at any given time.Type: GrantFiled: June 23, 2021Date of Patent: January 16, 2024Assignee: EMC IP Holding Company LLCInventors: Suren Kumar, Vinod Durairaj
-
Patent number: 11829770Abstract: Technology described herein is generally directed towards an efficient process to selectively boot (e.g., initialize, re-boot, re-initialize and/or the like) one or more nodes of a server node system based on contextual information that can be automatically acquired. In an embodiment, a system can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, can facilitate performance of operations. The operations can comprise monitoring operational activity of a node of a software-defined object storage system. The operations can comprise, in response to occurrence of a negative activity event determined based on a result of the monitoring, determining whether a node reboot of the node is to be implemented. The operations can comprise, based on the operational activity analyzed, setting a reboot flag indicating that the node reboot is to comprise a reboot of less than all components of the node.Type: GrantFiled: January 13, 2022Date of Patent: November 28, 2023Assignee: DELL PRODUCTS, L.P.Inventors: Suren Kumar, Vinod Durairaj, Veena Ramarao
-
Patent number: 11782493Abstract: A method and system for intelligent power distribution management. Specifically, the disclosed method and system propose allocating (and deallocating) reserve or supplemental electrical power to host devices dynamically based on intelligent analyses of host device telemetry including, but not limited to, workload criticality, workload computing resource utilization, hardware configuration metadata, various operational parameters describing host device state, and measurements (as well as other information) pertinent to electrical power usage.Type: GrantFiled: July 30, 2020Date of Patent: October 10, 2023Assignee: EMC IP Holding Company LLCInventors: Santosh Kumar Sahu, Sathish Kumar Ponnusamy, Suren Kumar J, Vinod Durairaj
-
Publication number: 20230221963Abstract: Technology described herein is generally directed towards an efficient process to selectively boot (e.g., initialize, re-boot, re-initialize and/or the like) one or more nodes of a server node system based on contextual information that can be automatically acquired. In an embodiment, a system can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, can facilitate performance of operations. The operations can comprise monitoring operational activity of a node of a software-defined object storage system. The operations can comprise, in response to occurrence of a negative activity event determined based on a result of the monitoring, determining whether a node reboot of the node is to be implemented. The operations can comprise, based on the operational activity analyzed, setting a reboot flag indicating that the node reboot is to comprise a reboot of less than all components of the node.Type: ApplicationFiled: January 13, 2022Publication date: July 13, 2023Inventors: Suren Kumar, Vinod Durairaj, Veena Ramarao
-
Patent number: 11645103Abstract: A method for securing the movement of virtual machines (VMs) between hosts. The method includes obtaining a first VM movement request; in response to obtaining the first VM movement request, identifying a first VM of the VMs and a first targeted host of the hosts associated with the first VM movement request using VM metadata and host metadata; making a first determination that the first targeted host is registered; in response to making the first determination, initiating the movement of the first VM to the first targeted host; and initiating, after the movement of the first VM, encryption of communication between the first VM and the first targeted host.Type: GrantFiled: July 23, 2020Date of Patent: May 9, 2023Assignee: EMC IP Holding Company LLCInventors: Suren Kumar, Vinod Durairaj, Veena Rao
-
Patent number: 11593161Abstract: Embodiments described herein relate to a method for new endpoint addition. The method may include receiving, during execution of a migration workflow, a request to add a new endpoint to the migration workflow. The execution of the migration workflow includes performing a first migration job associated with a first consistency group and assigned a first priority; making a first determination that the first priority is higher than a priority threshold; based on the first determination, completing the first migration job; performing, after completing the first migration job, a new endpoint addition action set. The method may also include adding, based on the new endpoint migration job priority, the new endpoint migration job to a queue of remaining migration jobs of the migration workflow.Type: GrantFiled: October 16, 2020Date of Patent: February 28, 2023Assignee: EMC IP Holding Company LLCInventors: Suren Kumar, Senthil Kumar Urkavalan, Vinod Durairaj
-
Patent number: 11593320Abstract: Systems and methods for dynamically moving virtual machine (VM) data based upon context are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: select a VM having a plurality of VM files; identify, among the plurality of VM files, a movable VM file; and transfer the movable VM file from a first storage tier to a second storage tier based upon a usage classification associated with the movable VM file.Type: GrantFiled: July 14, 2020Date of Patent: February 28, 2023Assignee: Dell Products, L.P.Inventors: Vinod Durairaj, Suren Kumar, Vaideeswaran Ganesan
-
Patent number: 11588697Abstract: In one embodiment, at least one processing device is configured to assign a plurality of devices of a cluster to a logical host group where at least one of the devices assigned to the logical host group has a network time parameter that is different than another of the devices assigned to the logical host group. The at least one processing device is further configured to determine a target network time parameter for the logical host group based at least in part on network time parameter related information about a given device of the plurality of devices assigned to the logical host group and to cause the plurality of devices to configure their respective network time parameters to the target network time parameter based at least in part on the assignment of the plurality of devices to the logical host group.Type: GrantFiled: January 21, 2021Date of Patent: February 21, 2023Assignee: Dell Products L.P.Inventors: Parminder Singh Sethi, Suren Kumar, Vinod Durairaj
-
Patent number: 11582107Abstract: A topology configuration system receives a graphic representation comprising object images of information handling systems to be configured for operating as a complex collection of information handling systems, uses artificial intelligence and deep learning to analyze images on the graphic representation and determine specific information handling systems present in the complex collection of information handling systems. A requirement list is used to create a configuration job. Sets of user instructions are sent to a user to guide the user and sets of device instructions are sent to each information handling system so that the user can configure the plurality of information handling systems to operate as the complex collection of information handling systems. Validation packets may be sent to each information handling system to confirm the complex collection of information handling systems is set up quickly and with little or no troubleshooting.Type: GrantFiled: July 23, 2021Date of Patent: February 14, 2023Assignee: Dell Products L.P.Inventors: Karthick Nagarajan, Kumar Prashant, Suren Kumar, Vinod Durairaj
-
Patent number: 11579912Abstract: A method includes identifying a source virtual machine to be migrated from a source domain to a target domain, extracting file-in-use metadata and shared asset metadata from virtual machine metadata of the source virtual machine, and copying one or more files identified in the file-in-use metadata to a target virtual machine in the target domain. For each of one or more shared assets identified in the shared asset metadata, the method further includes (a) determining whether or not the shared asset already exists in the target domain, (b) responsive to the shared asset already existing in the target domain, updating virtual machine metadata of the target virtual machine to specify the shared asset, and (c) responsive to the shared asset not already existing in the target domain, copying the shared asset to the target domain and updating virtual machine metadata of the target virtual machine to specify the shared asset.Type: GrantFiled: February 13, 2020Date of Patent: February 14, 2023Assignee: EMC IP Holding Company LLCInventors: Vaideeswaran Ganesan, Suren Kumar, Vinod Durairaj
-
Publication number: 20230022213Abstract: A topology configuration system receives a graphic representation comprising object images of information handling systems to be configured for operating as a complex collection of information handling systems, uses artificial intelligence and deep learning to analyze images on the graphic representation and determine specific information handling systems present in the complex collection of information handling systems. A requirement list is used to create a configuration job. Sets of user instructions are sent to a user to guide the user and sets of device instructions are sent to each information handling system so that the user can configure the plurality of information handling systems to operate as the complex collection of information handling systems. Validation packets may be sent to each information handling system to confirm the complex collection of information handling systems is set up quickly and with little or no troubleshooting.Type: ApplicationFiled: July 23, 2021Publication date: January 26, 2023Inventors: Karthick Nagarajan, Kumar Prashant, Suren Kumar, Vinod Durairaj
-
Publication number: 20220382780Abstract: Embodiments for providing end-to-end automated contextual and differentiated application level replication by dynamically creating replication profiles for asynchronous or synchronous replication at runtime to maintain any relevant service level agreement requirements. Based on relevant operating information, data sources are identified as critical and non-critical servers and their data is tagged accordingly in the replication application by using an analytics engine. The information and tags are used to produce a trained model for machine learning processes that can generated predictions for future replication operations. An error handler identifies erroneous predictions and provides a fallback mechanism to avoid any customer replication service level agreement breach at any given time.Type: ApplicationFiled: June 23, 2021Publication date: December 1, 2022Inventors: Suren Kumar, Vinod Durairaj
-
Publication number: 20220382879Abstract: One example method includes collecting container information concerning a container, analyzing the container information to identify a security tool needed to perform a vulnerability scan of the container, accessing the security tool from a knowledge lake, running the security tool on the container information to identify a security vulnerability of the container, based on the running of the security tool, generating an alert indicating that the container has the security vulnerability, capturing the security vulnerability and, based on the captured security vulnerability, updating a container image that was used to spawn the container.Type: ApplicationFiled: July 22, 2021Publication date: December 1, 2022Inventors: Suren Kumar, Vinod Durairaj
-
Publication number: 20220231916Abstract: In one embodiment, at least one processing device is configured to assign a plurality of devices of a cluster to a logical host group where at least one of the devices assigned to the logical host group has a network time parameter that is different than another of the devices assigned to the logical host group. The at least one processing device is further configured to determine a target network time parameter for the logical host group based at least in part on network time parameter related information about a given device of the plurality of devices assigned to the logical host group and to cause the plurality of devices to configure their respective network time parameters to the target network time parameter based at least in part on the assignment of the plurality of devices to the logical host group.Type: ApplicationFiled: January 21, 2021Publication date: July 21, 2022Inventors: Parminder Singh Sethi, Suren Kumar, Vinod Durairaj
-
Publication number: 20220121482Abstract: Embodiments described herein relate to a method for new endpoint addition. The method may include receiving, during execution of a migration workflow, a request to add a new endpoint to the migration workflow. The execution of the migration workflow includes performing a first migration job associated with a first consistency group and assigned a first priority; making a first determination that the first priority is higher than a priority threshold; based on the first determination, completing the first migration job; performing, after completing the first migration job, a new endpoint addition action set. The method may also include adding, based on the new endpoint migration job priority, the new endpoint migration job to a queue of remaining migration jobs of the migration workflow.Type: ApplicationFiled: October 16, 2020Publication date: April 21, 2022Inventors: Suren Kumar, Senthil Kumar Urkavalan, Vinod Durairaj
-
Publication number: 20220035429Abstract: A method and system for intelligent power distribution management. Specifically, the disclosed method and system propose allocating (and deallocating) reserve or supplemental electrical power to host devices dynamically based on intelligent analyses of host device telemetry including, but not limited to, workload criticality, workload computing resource utilization, hardware configuration metadata, various operational parameters describing host device state, and measurements (as well as other information) pertinent to electrical power usage.Type: ApplicationFiled: July 30, 2020Publication date: February 3, 2022Inventors: Santosh Kumar Sahu, Sathish Kumar Ponnusamy, Suren Kumar J, Vinod Durairaj
-
Publication number: 20220027184Abstract: A method for securing the movement of virtual machines (VMs) between hosts. The method includes obtaining a first VM movement request; in response to obtaining the first VM movement request, identifying a first VM of the VMs and a first targeted host of the hosts associated with the first VM movement request using VM metadata and host metadata; making a first determination that the first targeted host is registered; in response to making the first determination, initiating the movement of the first VM to the first targeted host; and initiating, after the movement of the first VM, encryption of communication between the first VM and the first targeted host.Type: ApplicationFiled: July 23, 2020Publication date: January 27, 2022Inventors: Suren Kumar, Vinod Durairaj, Veena Rao
-
Publication number: 20220019560Abstract: Systems and methods for dynamically moving virtual machine (VM) data based upon context are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: select a VM having a plurality of VM files; identify, among the plurality of VM files, a movable VM file; and transfer the movable VM file from a first storage tier to a second storage tier based upon a usage classification associated with the movable VM file.Type: ApplicationFiled: July 14, 2020Publication date: January 20, 2022Applicant: Dell Products, L.P.Inventors: Vinod Durairaj, Suren Kumar, Vaideeswaran Ganesan
-
Patent number: 11122130Abstract: Embodiments described herein relate to a method for orchestrating migrations using workflows. The method may include: receiving, by a migrator, a migration request; invoking, by the migrator, an endpoint information collector (EIC) to obtain endpoint information from a source endpoint and a target endpoint; performing a pre-requisite check using the endpoint information; analyzing, by a migration analyzer, the endpoint information to obtain a migration workflow; and performing a migration using the migration workflow.Type: GrantFiled: October 16, 2020Date of Patent: September 14, 2021Assignee: EMC IP Holding Company LLCInventors: Suren Kumar, Senthil Kumar Urkavalan, Sushbi Lal, Debadatta Mishra, Vinod Durairaj
-
Publication number: 20210255883Abstract: A method includes identifying a source virtual machine to be migrated from a source domain to a target domain, extracting file-in-use metadata and shared asset metadata from virtual machine metadata of the source virtual machine, and copying one or more files identified in the file-in-use metadata to a target virtual machine in the target domain. For each of one or more shared assets identified in the shared asset metadata, the method further includes (a) determining whether or not the shared asset already exists in the target domain, (b) responsive to the shared asset already existing in the target domain, updating virtual machine metadata of the target virtual machine to specify the shared asset, and (c) responsive to the shared asset not already existing in the target domain, copying the shared asset to the target domain and updating virtual machine metadata of the target virtual machine to specify the shared asset.Type: ApplicationFiled: February 13, 2020Publication date: August 19, 2021Inventors: Vaideeswaran Ganesan, Suren Kumar, Vinod Durairaj