Sinha, Bangalore
Akshay Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130167106 | METHOD AND SYSTEM FOR REAL-TIME VIEW OF SOFTWARE PRODUCT QUALITY - A system and method, the method including determining a quality score for at least one feature of a product, the quality score being a function of a priority of the at least one feature to the product, a relationship between the at least one feature and at least one design element comprising the at least one feature, and a complexity of the at least one design element; determining an overall quality score for the product based on a summation of each determined quality score for each of the at least one feature; and producing a report including the overall quality score for the product. | 06-27-2013 |
20140223378 | GRAPHICAL USER INTERFACE (GUI) THAT RECEIVES DIRECTIONAL INPUT TO CHANGE FACE FOR RECEIVING PASSCODE - A non-transitory computer-readable storage medium includes instructions stored thereon. When executed by at least one processor, the instructions may be configured to cause a computing system to at least generate a graphical user interface (GUI), receive selections of characters and directional input, and compare the selections of the characters and the directional input to a stored passcode combination. The GUI may include at least one face and a plurality of buttons inside the at least one face. At least some of the plurality of buttons may include characters in a random or pseudorandom sequence. The GUI may be configured to receive selections of the characters and directional input to the at least one face. | 08-07-2014 |
Alok Kumar Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110231659 | Out-of-Band Session Key Information Exchange - A source device that plans to participate in one or more encrypted communication sessions with a destination device sends a discovery message towards the destination device. An intermediary device that processes this discovery message requests a master key from the source device. The source verifies that the intermediary device is a trusted device and then sends the intermediary device the requested master key. Prior to transmitting encrypted messages to the destination device, the source device sends session key information, encrypted using the master key, to the intermediary device. The intermediary device uses this session key information to decrypt and process encrypted messages sent as part of the encrypted communication session between the source device and the destination device. | 09-22-2011 |
20160105336 | SGT Feature Trace Using Netflow - Tracing of networking feature data may be provided for networking features running on network devices such as routers and switches. Examples of this feature tracing include “SGT tracing”, “Access Control Entry (‘ACE’) tracing”, and “Equal Cost Multipath (‘ECMP’) tracing.” In ACE tracing, a network administrator may desire to trace all the ACEs of Access Control Lists (“ACLs”) a particular packet is subject to. In ECMP, tracing information may be collected as to the ECMP links a particular packet is sent through at each of a plurality of network devices. | 04-14-2016 |
Amit Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150348294 | HEAT MAPPING OF DEFECTS IN SOFTWARE PRODUCTS - Systems, methods, and other embodiments associated with heat mapping of defects in software components are described. In one embodiment, a method includes receiving feedback data that describes errors reported from a software product, wherein the software product includes components. Records are retrieved that are associated with the errors reported, where a record links an error to a defect in a component from the software product. A heat map is generated that has regions assigned to represent different components from the software product. Graphical elements are generated and added to a region for each defect identified in a corresponding component, where a size of a visual area of the region is based, at least in part, on a number of graphical elements contained in the region. | 12-03-2015 |
Anand Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090144739 | PERSISTENT SCHEDULING TECHNIQUES - Techniques for persistent scheduling are provided. A principal registers a schedule with a network-based scheduling service. The scheduling service determines when a trigger is to be sent to a client associated with the principal for purposes of having that client process a particular action. The trigger is sent when the client is detected as being online; and when the client is offline, the trigger is sent as soon as the client comes online. Furthermore, once a trigger is successfully sent, a current date and time that the trigger was sent is maintained with the schedule for the client. | 06-04-2009 |
20100138752 | Usage Of Flash Variables As Import Parameter For A Dashboard In A Portal Environment - Systems and method for using flash variables as import parameters for a dashboard in a portal environment are presented. One or more values that define a portal environment that displays a graphical dashboard are determined. The dashboard is adapted to display in the portal environment graphical representations of data from a data source connected with a backend system. A flash object is generated for retrieving selected data from the data source connected with the backend system based on a request for the data from the dashboard, and for generating the graphical representations for the dashboard. One or more flash variables corresponding to the one or more values are generated, the one or more flash variables defining the selected data of the data source to be retrieved based on the one or more values. The one or more flash variables are inserted into the flash object for retrieving the selected data from the data source. | 06-03-2010 |
20100211895 | METHOD FOR VISUALIZATION AND INTEGRATION OF BUSINESS INTELLIGENCE DATA - A method, system and means, the method includes defining a visualization dashboard, including defining at least one chart to include in the visualization dashboard and a range of data to occupy the at least one chart; defining data connections to at least one webservice of a business application platform (AP); and specifying webservice connections to a persistence of business intelligence data. | 08-19-2010 |
20110119288 | DETECTING AND APPLYING DATABASE SCHEMA CHANGES TO REPORTS - A system and method to detect database schema changes are described. In various embodiments, a method of the embodiments detects database schema changes via triggers. In various embodiments, the changes are detected by comparing database schemas and determining modifications to database tables and database columns thereof. In various embodiments, the detected changes are applied to a report by generating a parse tree relevant for the modifications to database tables and columns; and traversing the tree to produce a statement to change the report to be relevant for the modifications to database tables and columns. | 05-19-2011 |
20120072993 | APPARATUS AND METHOD FOR MUTATING SENSITIVE DATA - A computer readable storage medium includes executable instructions to receive data from a data source. Data mutation criteria is applied to designated data elements to produce mutated data that preserves an identifiable relationship between an original designated data element and a corresponding mutated data element. The data mutation criteria also produces mutated data with an identifiable relationship between related mutated data elements. The mutated data is loaded into a report and the report is displayed. | 03-22-2012 |
20130151847 | Authentication Certificates as Source of Contextual Information in Business Intelligence Processes - A certificate of a user is presented by a client to a server. The certificate is used to authenticate communications between the client and the server. Thereafter, data from the certificate is cached at the server. The server then initiates one or more business intelligence processes of a business intelligence application at the client using the cached data to provide context to the one or more business intelligence processes. Related apparatus, systems, techniques and articles are also described. | 06-13-2013 |
20140150114 | VISUAL SECUREMENT OF SENSITIVE DATA - Various embodiments of systems and methods for visual securement of sensitive data are described herein. In one aspect, the method includes receiving a request for displaying a report. It is determined whether the requested report comprises sensitive data. When the report comprises the sensitive data, a display rule related to the sensitive data is identified. Based upon the identified display rule, the sensitive data within the report is displayed. | 05-29-2014 |
20140258927 | INTERACTIVE GRAPHICAL DOCUMENT INSIGHT ELEMENT - In one embodiment, metadata associated with a document is received. At least one keyword is extracted from the received metadata, wherein the at least one keyword include at least one of actionable information and non-actionable information. Further, an interactive graphical document insight element is generated including a representation of the non-actionable information and one or more interactive icons representing the actionable information. The generated interactive graphical document insight element is rendered on a computer generated user interface. | 09-11-2014 |
20150046994 | ZERO-STEP AUTO-CUSTOMIZATION OF MOBILE APPLICATIONS - In an embodiment, mobile application downloaded and installed in a mobile device is launched for the first time. The mobile application automatically locates a configuration server and connects automatically to the located configuration server. After connection is established with the configuration server, appropriate configuration parameters set is identified and automatically fetched to the mobile device. The fetched configuration parameters set is automatically applied to the mobile application. After applying the configuration parameters set, automatically authenticate the mobile application to an enterprise server. Thus, when the user of the mobile device launches the installed mobile application for the first time, the zero-step auto-customization noted above takes place without manual intervention. The user is thus able to use the mobile application in a normal manner subject to the configurations applied. | 02-12-2015 |
Anil Kumar Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140245408 | BIOMETRIC APPROACH TO TRACK CREDENTIALS OF ANONYMOUS USER OF A MOBILE DEVICE - A system includes one or more mobile devices and a shared server. Each of the one or more mobile devices is associated with a unique identification tag and configured to send biometric information about anonymous users to a shared server space. The shared server provides the shared server space. The shared server is generally configured to store biometric information about a plurality of anonymous users associated with the unique identification tag of each of the one or more mobile devices. In response to a query about a lost or stolen mobile device, the shared server is enabled to track credentials of anonymous users associated with the unique identification tag of the lost or stolen mobile device. | 08-28-2014 |
Anupam Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20080300959 | ENTERPRISE APPLICATION PROCUREMENT SYSTEM - An intermediate processing layer provides for the inclusion of procurement functionalities of a multi-level enterprise business application by bridging processing and other operational gaps in the enterprise application. The invention further includes the methodology for operating the procurement management system including numerous processing steps or operations, which may be guided in part based on software-based executable instructions or guidelines incorporated into or governing the executable operations. The procurement system includes four defined portals, a procurement portal, a sourcing portal, a reporting portal, and a supplier portal. The procurement system further includes additional levels of support, information or other layers of user interface. These portals and layers are disposed within existing processing components of the business enterprise suite and provide an interactive component to various users, specifically through the portals. | 12-04-2008 |
Bhartendu Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20080220715 | Controlling Use Of Devices In Large Restricted Areas - A usage specification device is used to limit the use of information signals (audio, image, data) and to limit the output of disturbing signals (speaker, flash, light, RF transmission) in several devices in a large restricted area. For example, the usage specification device may transmit a certain type of control signal to disable image capture by camera-equipped portable/mobile devices, or it may transmit other types of control signals to disable audio capture or data capture by such devices. Similarly, the specification device may transmit a certain type of control signal to reduce the speaker volume on portable/mobile devices, or it may transmit other types of control signals to disable the flash, or minimize the intensity of light emitted by the display or restrict the transmission of RF signals from such devices. Due to such features, only undesirable features of portable/mobile devices may be prevented in restricted areas, while permitting other uses. According to another aspect, the device can be scanned by an external scanner for a built-in code, with the code indicating the specific type of capabilities the device has and the specific type of usage controls supported by the device. Accordingly, the owner of a premises may first scan a device to determine the specific capabilities and control features supported before permitting the device to be carried into the premises. | 09-11-2008 |
Bijay Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130321452 | SYSTEM AND METHOD FOR PROTECTING THE PRIVACY OF OBJECTS RENDERED ON A DISPLAY - A system and method of protecting one or more objects rendered on a display device from being observed by an unwanted viewer. A primary object is rendered on the display device, and a privacy protection object is simultaneously rendered over at least a portion of the primary object. At least a portion of the privacy protection object is rendered with a color saturation value, a transparency value, and a phase delay relative to the primary object such that the portion of the primary object over which the privacy protection object is rendered is visibly obscured to a viewer that is located greater than a predetermined viewing distance from the display device and beyond a predetermined field of view of the display device. | 12-05-2013 |
Charu Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120030588 | PROVIDING SOCIAL LIKENESS WITHIN A MESSAGING CONTEXT - Embodiments are directed towards providing a likeness application that may be integrated into one or more different messaging applications to provide a user with an indication of how much the user may be liked by their messaging contacts. Such application is directed towards providing a level of fun to a first user through a dynamically calculated social networking indicator. In one embodiment, the first user may communicate with one or more other users over a network using the messaging application modified with the likeness application. The other users may also communicate with each other over the network using the modified messaging application. Then, at various times or conditions, the likeness application may display to the first user a relative percentage indicating how much the first user is being ‘liked’ by one or more other users. | 02-02-2012 |
Koushik Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120324062 | IDENTIFICATION OF THE LOCATION OF NODES DISTRIBUTED IN AD HOC NETWORKS - A location of node i in a network having a plurality of nodes is identified by intersecting regions that are guaranteed to contain the node i with respect the other nodes that are neighbors of the node i and iteratively minimizing the size of the intersection region containing the node i. | 12-20-2012 |
20130254355 | IDENTIFICATION OF THE LOCATION OF NODES DISTRIBUTED IN AD HOC NETWORKS - A location of node i in a network having a plurality of nodes is identified by intersecting regions that are guaranteed to contain the node i with respect the other nodes that are neighbors of the node i and iteratively minimizing the size of the intersection region containing the node i. | 09-26-2013 |
Neesha Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20160124722 | JSON STYLESHEET LANGUAGE TRANSFORMATION - Systems and methods are provided for specifying transformations of JSON objects using other JSON objects. A first object is received specified using JavaScript Object Notation. The first object includes a set of one or more attributes where each attribute is of a predetermined JSON data type and has at least one value. A second object is also received specified using JavaScript Object Notation. The second object includes a set of one or more attributes each corresponding to at least one attribute in the set of attributes of the first object and having at least one value defining one or more transformations. A third object specified using JavaScript Object Notation is generated based on transforming the first object using the second object. | 05-05-2016 |
Nishant Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140059522 | Generating Test Cases for Covering Enterprise Rules and Predicates - Techniques, an apparatus and an article of manufacture for generating test cases for covering enterprise rules and predicates. A method includes obtaining a web application and a specification of at least one enterprise rule, constructing a link graph that captures at least one navigation path in the web application, and performing a traversal of the web application guided by the link graph to generate an executable test case that drives the web application along one of the at least one navigation paths in which the at least one enterprise rule is covered to determine the web application's conformance to the at least one enterprise rule, wherein the executable test case is a sequence of one or more test steps, each test step representing an action to be performed on the web application and/or a verification of the application state. | 02-27-2014 |
20140172512 | EFFICIENTLY GENERATING TEST CASES - Techniques, an apparatus and computer program product for generating test cases for covering enterprise rules and predicates are disclosed by receiving data associated with at least one of a business requirement and a business scenario as input, wherein the data comprise at least one of a set of predefined rules; based on the data, generating at least one or more test cases as output without any human intervention, wherein the output comprises a test script for the business requirement or the business scenario, and wherein the data associated with the at least one of a business requirement and a business scenario comprise at least one of a business rule, business requirement and predicate, the data associated with the at least one of business requirement and business scenario are stored as a linked graph in a repository, and wherein each node of the linked graph is mapped to previously stored data in the repository, wherein the repository comprises either one of a structured or unstructured data, and the data are obtained from the requirement specifications. | 06-19-2014 |
Prabhakar Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120158802 | MP4 CONTAINER FILE FORMATS AND METHODS OF PROCESSING MP4 CONTAINER FILES - A file that is compatible with a media player application that reads media files compliant with MP4, is created by including in the file a parent container containing child containers. The child containers include a metadata container containing metadata relating to the media presentation and a media data container containing media samples for multiple tracks of the media presentation. The metadata container contains multiple child containers containing metadata for the multiple tracks respectively. The metadata container contains at least one additional child container that reserves free space in the metadata container but does not contain metadata, whereby in the event of adding a track to the presentation the free space in the additional child container may be overwritten with metadata for the added track without affecting the size of the metadata container. | 06-21-2012 |
Prasoon Kumar Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140108667 | Techniques for Generating Different Sessions for Multiple Tabs of a Single Browser Window - A technique for creating different sessions for each tab of a client browser window includes receiving a first login request associated with a first tab of the client browser window, and in response to the first login request: generating a first uniform resource locator and a first session cookie having a path that includes the first uniform resource locator; and transmitting the first session cookie to the client browser. The technique further includes receiving a second login request that is associated with a second tab of the client browser window, and in response to the second login request, generating a second uniform resource locator and a second session cookie. The second uniform resource locator is different from the first uniform resource locator and a path of the second session cookie includes the second uniform source locator. The technique also includes transmitting the second session cookie to the client browser. | 04-17-2014 |
Praveen K. Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110131001 | OPEN-SERVICE BASED TEST EXECUTION FRAMEWORKS - An open-service based test execution framework that is based on disconnected architecture, with agent-initiated “REST” connectivity. Further contemplated herein are systems and methods for “unified resource store access” test management, distribution and execution. | 06-02-2011 |
Puneet Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140006845 | METHOD AND SYSTEM FOR MANAGING A COMMUNICATION NETWORK | 01-02-2014 |
20140016649 | OPTIMIZING FORWARD DATABASE FOR A BURSTY NETWORK TRAFFIC - The present invention discloses a method for optimizing forwarding database (FDB Table) in a bursty traffic computer network environment. In one embodiment herein there is provided a small lookup table that is created by manually filling static entries of nodes, and by filling dynamic entries that are automatically made by the switch while learning and forwarding process. A MAC address is looked in the small lookup table first, and upon finding the said address, the same is used for forwarding a packet. The MAC address may be copied from the FDB Table into the small lookup table upon not finding the said address into the small lookup table. | 01-16-2014 |
Purnendu Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110246831 | METHOD AND APPARATUS FOR OPERATIONAL-LEVEL FUNCTIONAL AND DEGRADATION FAULT ANALYSIS - An apparatus and method are provided for analyzing fault tolerance of a system, and performing “what if?” analysis for various fault-tolerant system design options. The fault tolerance analysis approach handles logical failures and quality faults emanating from loss of precision in signal values. The method can detect quality faults, which can allow systems to be built which are resilient to precision losses. Two analysis steps are provided, one static and another simulation-based, which are used in tandem to check the fault tolerance of an automotive or other system. While a simulation-based method checks fault-resilience under specific test cases and fault-scenarios, the static analysis method quickly checks all test cases and fault-scenarios. The static analysis method makes approximations while performing the analysis, and any fault detected is reproduced using the simulation-based method. All analysis operations are performed on operations-level behavioral models of the applications, thereby reducing the cost of analysis. | 10-06-2011 |
20120166878 | Methods and Systems for Diagnosing Hardware and Software Faults Using Time-Stamped Events - A transportation vehicle including a high-resolution clock, an electronic network including two or more tasks, including first and second tasks, and a memory including instructions causing a processor to classify faults in the electronic network using the clock. The steps include receiving a first fault code generated at the first task, receiving a second fault trouble code generated at the second task of the electronic system in response to a second fault, and identifying an execution cycle offset associated with the first and second tasks using an execution schedule, and considering whether the first cycle is separated from the second cycle by the execution cycle offset identified by the schedule. The instructions also cause the processor to identify causal relationships for a plurality of faults via a pair-wise repetition of the above-described analysis for at least one combination of tasks other than the first and second tasks. | 06-28-2012 |
Rahul Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150193545 | SYSTEM AND METHOD OF DATA COMPRESSION - This disclosure relates to systems and methods for adaptively compressing data based on compression parameters. In one embodiment, a method for compressing a dataset is disclosed, including filtering a dataset based on occurrence of an event, and determining a quality of information index indicating a measure of quality of the dataset based on a quality of information estimation function. The method may include comparing the quality of information index with a list of indices stored in a lookup table to identify a target quality of information index and corresponding compression parameters, wherein the target quality of information index is indicative of a reference measure of quality of the dataset applicable for deriving statistical inferences based on analysis of the dataset. Also, the method may include inputting the compression parameters in a compression algorithm for compressing the dataset to achieve the target quality of information index for the analysis. | 07-09-2015 |
Raja Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150220734 | MOBILE APPLICATION MANAGEMENT - Code of a particular application is analyzed against a semantic model of a software development kit of a particular platform. The semantic model associates a plurality of application behaviors with respective application programming interface (API) calls of the particular platform. A set of behaviors of the particular application is identified based on the analysis of the code and a particular one of the set of behaviors is identified as an undesired behavior. The particular application can be automatically modified to remediate the undesired behavior. The particular application can be assigned to one of a plurality of device modes, and access to the particular application on a user device can be based on which of the plurality of device modes is active on the user device. | 08-06-2015 |
Rakesh Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150085568 | READ/WRITE ASSIST FOR MEMORIES - An integrated circuit includes one or more bit cells, a word line coupled to the one or more bit cells, and a dummy word line arranged with the word line to have a capacitance therebetween. The capacitance provides a voltage boost or reduction of the word line to assist read and write operations. | 03-26-2015 |
Rakesh Kumar Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150063046 | MEMORY TIMING CIRCUIT - Disclosed are various apparatuses and methods for a memory with a multiple word line design. A memory timing circuit may include a dummy word line including a first portion and a second portion and further including capacitative loading that is lumped in the second portion of the dummy word line, a first transistor connected to the first portion of the dummy word line and configured to charge the dummy word line, and a second transistor connected to the second portion of the dummy word line and configured to discharge the dummy word line. A method may include charging a dummy word line using a first transistor, and discharging the dummy word line using a second transistor, wherein the dummy word line includes a first portion and a second portion and further includes capacitative loading that is lumped in the second portion of the dummy word line. | 03-05-2015 |
Reema Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090036578 | Polyester Compositions, Method Of Manufacture, And Uses Thereof - A composition is described, comprising: (a) from 20 to 80 wt % of a polyester; (b) from 5 to 35 wt % of a flame retardant phosphinate of the formula (I) | 02-05-2009 |
20130001824 | FLOW IN REINFORCED POLYIMIDE COMPOSITIONS - Reinforced polyimide compositions that include a reinforcing filler and a polyamide flow promoter improve flow promotion while maintaining other mechanical, thermal, flame and/or electrical properties of the compositions. The compositions may include an inorganic or organic reinforcing filler, a polyimide resin such as polyetherimide or polyamideimide and a small amount of an aromatic or aliphatic polyamide as the flow promoter. The resulting compositions may be used in thinner-wall applications while still retaining the advantageous physical properties of reinforced polyimide compositions not having the flow promoter. This abstract is intended as a scanning tool for purposes of searching in the particular art and is not intended to be limiting of the present invention. | 01-03-2013 |
20140197367 | Broadening of Percolation Slope in Conductive Carbon Black Compositions with at least One Non-Conductive Polymer - The present disclosure relates to thermoplastic electrostatic dissipative (ESD) composites. The disclosed compositions comprise a thermoplastic resin phase and a filler composition comprising a conductive carbon black and a non-conductive polymer, dispersed within the thermoplastic resin phase. Also disclosed are methods for the manufacture of the disclosed composites and articles of manufacture comprising same. | 07-17-2014 |
20140243466 | WEAR AND FRICTION PROPERTIES OF ENGINEERING THERMOPLASTICS WITH ULTRA-HIGH MOLECULAR WEIGHT POLYETHYLENE - Disclosed herein are compositions comprising a polymer comprising polyetherimide, polyetheretherketone, polyamide, polyoxyalkylene, or polyalkylene terephthalate, or a mixture thereof, and ultra-high molecular weight polyethylene, wherein the ultra-high molecular weight polyethylene comprises a surface modifier. Also disclosed are articles comprising one or more of the described compositions. This abstract is intended as a scanning tool for purposes of searching in the particular art and is not intended to be limiting of the present invention. | 08-28-2014 |
Ritesh Kumar Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130280180 | ANTIMICROBIAL MICROEMULSION MOUTHWASH COMPOSITION - The invention relates to a transparent/translucent liquid antimicrobial mouthwash composition that is substantially free of low molecular weight alcohol. It is a problem to include antimicrobial actives of natural origin (essential oils) which are generally substantially water insoluble materials in an aqueous composition that is transparent or translucent. One way of including such oils in water while ensuring transparency is to formulate them in a microemulsion composition. However microemulsion compositions generally require high amounts of surfactants and solvents especially low molecular weight alcohol. It is thus a challenge to formulate a mouthwash composition that is on the one hand effective in killing microbes while on the other hand has a transparent/translucent appearance while being substantially free of low molecular weight alcohol. The present inventors have solved this problem and have come up with a microemulsion mouthwash composition which meets all of the above objectives while being especially effective in killing | 10-24-2013 |
20130295027 | ORAL CARE COMPOSITION - The present invention relates to an oral care composition and a method of disinfecting the oral cavity. So far synthetic material (e.g. Triclosan) has been used which is believed by many consumers to be harsh on them. Consumers, more and more prefer using products that contain natural materials. Further, in many countries, culturally or otherwise, people are reluctant to using alcohol in their mouthwashes. The present inventors have been working on solving these problems and have come up with an oral care composition which includes natural materials that are found to interact synergistically with certain metal salts in killing | 11-07-2013 |
Ritwik Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130325530 | METHOD AND SYSTEM FOR DETERMINING CUSTOMER CONVERSION - Embodiments of the present invention disclose a method and system for determining customer conversion propensity. According to one embodiment, a source registrant group having a plurality of registered customers is identified from a database. A probability for a conversion event is then computed for each of the plurality of customers within the source registrant group is then computed. The customers within the source registrant are than categorized based on the computed probability value and a timing for the conversion event. | 12-05-2013 |
Sachin Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20160055195 | METHOD AND SYSTEM FOR PROVIDING CONCURRENT BUFFER POOL AND PAGE CACHE - The present disclosure provides a method for providing concurrent one or more buffer pools associated with a database of a database management system is provided. The method includes creating one or more tables in each of the one or more buffer pools at runtime, receiving a request simultaneously from a corresponding plurality of users for accessing a page of a plurality of pages stored in a buffer pool of the one or more buffer pools and enabling each of the plurality of users to access the corresponding page of the plurality of pages concurrently. Each of the one or more tables is a lockless table. Each of the one or more tables includes a plurality of lockless slots. The plurality of pages is requested from a corresponding slot of the plurality of lockless slots in a corresponding table of the one or more tables in the buffer pool. | 02-25-2016 |
20160055257 | METHOD AND SYSTEM FOR ADAPTIVE PRE-FETCHING OF PAGES INTO A BUFFER POOL - The present disclosure provides a method for pre-fetching one or more pages from a database stored on a data storage device is provided. The one or more pages are pre-fetched in a corresponding buffer pool of one or more buffer pools. The method includes initiating the pre-fetching of the one or more pages from the database stored on the data storage device into the corresponding buffer pool of the one or more buffer pools, enabling a decision for pre-fetching the one or more pages from the database to the buffer pool of the one or more buffer pools based on a calculated probability score and fetching the one or more pages asynchronously from the database into the buffer pool of the one or more buffer pools based on the decision. The pre-fetching is done at any instant of time. | 02-25-2016 |
Sanjay K. Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110110512 | SYSTEM AND METHOD FOR PROVIDING SIGNALING IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes communicating initial digits associated with an original request for a call and receiving a message indicating an incomplete address for the original request. The method also includes responding to the message by appending additional digits to the original request to generate a new request. The additional digits are buffered before receiving the message indicating the incomplete address associated with the original request. In other embodiments, the original request is a session initiation protocol (SIP) INVITE message that includes a uniform resource identifier (URI), which reflects an address for reaching a destination user. The initial digits can be partially matched against a dial plan in order to trigger the message associated with the original request. The additional digits are configured to satisfy the message and to connect the call. The message associated with the original request can be a session initiation protocol (SIP) 484 message. | 05-12-2011 |
Sarika Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130097582 | HIERARCHICAL FUNCTIONAL AND VARIABLE COMPOSITION DIAGRAMMING OF A PROGRAMMING CLASS - Inheritance contributions of programming class functions and class variables are diagrammed. A functional diagram illustrates individual class contributions of functions. A variable composition diagram illustrates individual class contributions of variables. A diagrammatic depiction of functions overridden and functions contributed in the inheritance hierarchy is provided. Functions which are unique, overridden and/or have contributions in different classes of the hierarchy are visually distinguished (e.g., by distinguishing marks). Classes in the hierarchy are graphically depicted with relative sizes based on percent contribution. | 04-18-2013 |
20130104060 | DYNAMIC SELECTION OF ONE OF MANY AVAILABLE WEB BROWSERS - A user selection of an item corresponding to a Web page can be received. The user selection can represents a request to open the Web page within an instantiated one of a set of Web browser applications installed on a computing device. A set of Web page elements unique to the Web page can be identified through an analysis conducted by the computing device. The identified set of Web page elements can be utilized to determine at the computing device one of the installed Web browser applications for the Web page. The determination of the one installed Web browser application can varies from Web page-to-Web page. At the computing device, the determined one of the Web browser applications can be instantiated. The Web page can be opened within the instantiated one of the Web browser applications. | 04-25-2013 |
20140137076 | INDICATING HIERARCHY DIVERSION IN A CLASS DIAGRAM - Indicating hierarchy diversion in a class diagram. A class inheritance structure for at least one parent class contained in computer program code can be identified to determine a class hierarchy corresponding to the parent class. For at least one child class in the class hierarchy that is a child of the parent class, a parent-child similarity value corresponding to a parent-child diversion of the child class from the parent class can be calculated via a processor. The class diagram can be generated. The class diagram can indicate at least the parent class, the child class and the parent-child similarity value. The class diagram can be presented. | 05-15-2014 |
20140137081 | INDICATING HIERARCHY DIVERSION IN A CLASS DIAGRAM - Indicating hierarchy diversion in a class diagram. A class inheritance structure for at least one parent class contained in computer program code can be identified to determine a class hierarchy corresponding to the parent class. For at least one child class in the class hierarchy that is a child of the parent class, a parent-child similarity value corresponding to a parent-child diversion of the child class from the parent class can be calculated via a processor. The class diagram can be generated. The class diagram can indicate at least the parent class, the child class and the parent-child similarity value. The class diagram can be presented. | 05-15-2014 |
Saurabh Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140059522 | Generating Test Cases for Covering Enterprise Rules and Predicates - Techniques, an apparatus and an article of manufacture for generating test cases for covering enterprise rules and predicates. A method includes obtaining a web application and a specification of at least one enterprise rule, constructing a link graph that captures at least one navigation path in the web application, and performing a traversal of the web application guided by the link graph to generate an executable test case that drives the web application along one of the at least one navigation paths in which the at least one enterprise rule is covered to determine the web application's conformance to the at least one enterprise rule, wherein the executable test case is a sequence of one or more test steps, each test step representing an action to be performed on the web application and/or a verification of the application state. | 02-27-2014 |
20140115558 | Generating and Employing Operational Abstractions of Transforms - Methods and arrangements for employing a software model transform. A software model transform is accepted, and the transform is manipulated to obtain a transform representation. At least one functional path is explored with respect to the transform representation. A trace is conducted of at least one explored path, and an abstraction of the transform is produced via utilizing the trace, the abstraction comprising a simplified semantic view of the transform. | 04-24-2014 |
20150242306 | SYSTEM AND METHOD FOR CREATING CHANGE-RESILIENT SCRIPTS - A method for creating agnostic test automation script commands associated with a specified action and a user interface (UI) is provided. The method may include receiving a target element associated with the specified action. The method may also generate at least one anchor uniquely identifying the target element, wherein the target element is ambiguous. The method may further include generating an agnostic test automation script command based on the received target element and the at least one generated anchor. Additionally, the method may analyze, using the generated agnostic test automation script command, the at least one generated anchor to locate the target element within the user interface (UI), wherein the analyzing is based on an application on which the agnostic test automation script command is to be executed. The method may also include performing, using the generated agnostic test automation script command, the specified action on the located target element. | 08-27-2015 |
20160132421 | ADAPTATION OF AUTOMATED TEST SCRIPTS - Embodiments provide a computerized method for adapting automating test scripts, said method including: utilizing at least one processor to execute computer code that performs the steps of: receiving, at an input device, an original test script created to test an application; utilizing the original test script to test, using the processor, a variant of the application; identifying, using the processor, failures in the original test script when the variant of the application is being tested; and modifying, using the processor, the original test script to overcome the identified failures. | 05-12-2016 |
Shashank Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140036954 | METHOD AND DEVICE FOR DISSOLVED GAS ANALYSIS - A method for dissolved gas analysis is presented. The method includes the steps of irradiating a fluid with electromagnetic radiation; and determining a concentration of a gas as a function of a temperature change of the fluid in response to the irradiation. A device for such an analysis of dissolved gases in a fluid, and a system having such device are also described. | 02-06-2014 |
Sounak Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150032863 | AUTOMATIC CONFIGURATION OF ENDPOINT COMMUNICATION DEVICES TO SET UP A VOIP NETWORK - Implementations relate to automatic configuration of endpoint communication devices to set up a communication network such as a VOIP network. In some implementations, a method includes a server receiving an extension request for device extension from an endpoint communications device connected to a communication network, mapping an identifier for the endpoint communications device to a device extension, and transmitting the device extension to the endpoint communications device. | 01-29-2015 |
Sudip Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150323422 | SYSTEM AND METHOD FOR EVALUATING OPPORTUNITIES TO EXTEND OPERATING DURATIONS - Aspects of the present disclosure relate generally to a system and method for evaluating opportunities to extend operating durations. A system according to the present disclosure can include: a computing device in communication with a machine amongst a plurality of machines within a machine system, the machine being subject to a particular operating duration, wherein the computing device is configured to perform actions including: examining operating data for the machine; modeling future performance data for the machine; calculating an operating duration extension risk for the machine; determining whether the machine is eligible for an operating duration extension based on the examined operating data, the modeled future performance data, and the calculated operating duration extension risk; and calculating an extension readiness metric for the machine in response to the machine being eligible for the operating duration extension. | 11-12-2015 |
Sudip Kumar Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140053403 | METHOD FOR EXTENDING AN ORIGINAL SERVICE LIFE OF GAS TURBINE COMPONENTS - A method for extending a service life of a gas turbine component includes identifying the service life for the component and comparing a characteristic of the component to a predetermined departure parameter. The method further includes refurbishing the component to a predetermined specification if the characteristic of the component satisfies the predetermined departure parameter and establishing an extended service life for the component. | 02-27-2014 |
Vibha Singhal Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20160132694 | Preventing Sharing of Sensitive Information Through Code Repositories - Methods, systems, and computer program products for preventing sharing of sensitive information through code repositories are provided herein. A method includes detecting one or more items of sensitive information in a check-in associated with a given user in a shared version management system; automatically refactoring the one or more items of sensitive information in the check-in by externalizing the one or more items of sensitive information as an encrypted file; and upon acceptance by the user of one or more changes to the check-in, automatically (i) decrypting the encrypted file using one or more code repository credentials associated with the given user, and (ii) incorporating the one or more items of sensitive information into the check-in. | 05-12-2016 |
Vikas Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110254603 | PHASE INTERPOLATOR AND A DELAY CIRCUIT FOR THE PHASE INTERPOLATOR - Phase interpolator and a delay circuit for the phase interpolator. The phase interpolator includes a variable delay circuit to rotate phase of an input clock to generate a phase rotated signal. The phase interpolator also includes a delay locked loop coupled to the variable delay circuit to generate a plurality of phase shifted outputs. The delay locked loop includes a plurality of delay elements. Each delay element includes a multiplexer and a delay cell coupled to the multiplexer. The multiplexer is configurable using a first control signal to output one of the phase rotated signal and a phase shifted output of the plurality of phase shifted outputs. The delay cell delays one of the phase rotated signal and the phase shifted output to generate another phase shifted output of the plurality of phase shifted outputs. | 10-20-2011 |
Vikash Kumar Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090247654 | POLYMERIC FOAMS WITH NANOCELLULAR MORPHOLOGY AND METHODS FOR MAKING THEM - A foamable polymeric composition can comprise a polymer, a blowing agent cage material, and a blowing agent. The blowing agent cage material is selected from the group consisting of zeolite imidazolate framework, metal organic framework, carbon cage structure, and combinations comprising at least one of the foregoing. In one embodiment, the composition can be formed by mixing the polymer with the blowing agent cage material to form a mixture, introducing a blowing agent to the mixture, and forming the mixture into pellets. | 10-01-2009 |
Vineet Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150269062 | DEFINING TEST BED REQUIREMENTS - Systems and techniques are described for defining test bed requirements. A described technique includes receiving data specifying a first test to be performed for a software application. The data identifies test bed requirements for the first test. Data identifying characteristics of each of available test beds are obtained. Each available test bed includes one or more computing resources on which software tests are performed. The characteristics of each available test bed specify characteristics of the one or more computing resources included in the available test bed. A determination is made that the characteristics of a particular test bed of the available test beds satisfy the test bed requirements for the first test. In response to determining that the characteristics of the particular test bed satisfy the test bed requirements, the first test is performed using the particular test bed. | 09-24-2015 |
Vineet Kumar Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150127858 | Dynamic virtual machine (VM) input-output per second (IOPS) control based on application IO profiling & VM IO usage trend analysis - Embodiments of the present invention include systems and methods for controlling input-output (IO) requests of a plurality of virtual machines to a datastore. The method includes: monitoring, for each virtual machine, a throughput of IO to a datastore for a preset time interval; identifying a peak value of the throughput; calculating a value of input-output-per-second (IOPS) using the peak value; and setting the value of IOPS as an IOPS limit for a corresponding virtual machine. | 05-07-2015 |
20150309827 | CONVERTING VIRTUAL MACHINE I/O REQUESTS - Systems, computer readable mediums, and techniques are described for converting virtual machine input/output (I/O) requests. One of the techniques includes obtaining access request data for one or more virtual machines (VMs) executing on a physical machine, wherein the access request data characterizes data access requests received from the one or more VMs; classifying, using the access request data, each of the one or more VMs as having either a sequential data access pattern or a random data access pattern; receiving a first I/O request packet from a first VM of the one or more VMs; determining that the first VM has been classified as having a random data access pattern; and splitting the first I/O request packet into a plurality of second I/O request packets based at least in part on determining that the first VM has been classified as having a random data access pattern. | 10-29-2015 |
20150347278 | IDENTIFYING TEST GAPS USING CODE EXECUTION PATHS - Systems and techniques are described for identifying test gaps. A described technique includes identifying production code paths for an application. Each production code path specifies a respective sequence of code of the application that was executed in a production environment. Test code paths are identified for the application. Each test code path specifies a respective sequence of code of the application that was tested in a test environment. The production code paths are compared to the test code paths to identify a set of first test gaps for the application. Each first test gap specifies a respective production code path that is not included in the test code paths. Test gap data specifying the first test gaps for the application can be provided for presentation to a user. | 12-03-2015 |
20160034375 | DETERMINING TEST CASE PRIORITIES BASED ON TAGGED EXECUTION PATHS - Test case priorities are automatically determined based on the execution path of a software application that includes priority tags. By embedding the priority tags in the source code of the software application, the consistency and reliability of the test case priorities is improved compared to conventional, primarily manual approaches to determining test case priorities. Further, efficiency is increased by providing run-time feedback regarding test cases that facilitates identification of the highest priority test cases and corresponding test suite optimizations. | 02-04-2016 |
20160048437 | MULTIPLE TEST TYPE ANALYSIS FOR A TEST CASE USING TEST CASE METADATA - In one embodiment, a method determines a test case containing test code for testing a functionality of a computer system. The test case is associated with metadata. The metadata is parsed to determine a plurality of system test types and one or more parameters for the plurality of system test types wherein the one or more parameters indicate system conditions for the computer system. The method executes a set of tests using the test code with the computer system using the system conditions. Results of the executed set of tests are output for the plurality of system test types. | 02-18-2016 |
Vlkash Kumar Sinha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090148665 | NANO-CELLULAR POLYMER FOAM AND METHODS FOR MAKING THEM - A nano-cellular polymer foam is disclosed, which has an average pore size from about 10 nanometers to about 500 nanometers; and a foam density that is from about 1 percent to about 50 percent of the bulk density of the material of the nano-cellular foam. | 06-11-2009 |