Ashok, US
Ambica Ashok, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20080222361 | PIPELINED TAG AND INFORMATION ARRAY ACCESS WITH SPECULATIVE RETRIEVAL OF TAG THAT CORRESPONDS TO INFORMATION ACCESS - A cache design is described in which corresponding accesses to tag and information arrays are phased in time, and in which tags are retrieved (typically speculatively) from a tag array without benefit of an effective address calculation subsequently used for a corresponding retrieval from an information array. In some exploitations, such a design may allow cycle times (and throughput) of a memory subsystem to more closely match demands of some processor and computation system architectures. In some cases, phased access can be described as pipelined tag and information array access, though strictly speaking, indexing into the information array need not depend on results of the tag array access. Our techniques seek to allow early (indeed speculative) retrieval from the tag array without delays that would otherwise be associated with calculation of an effective address eventually employed for a corresponding retrieval from the information array. Speculation can be resolved using the eventually calculated effective address or using separate functionality. In some embodiments, we use calculated effective addresses for way selection based on tags retrieved from the tag array. | 09-11-2008 |
20110307769 | ERROR DETECTION IN A CONTENT ADDRESSABLE MEMORY (CAM) AND METHOD OF OPERATION - A method for accessing a content addressable memory (CAM) system having a CAM and random access memory (RAM) includes providing comparand data to the CAM, comparing the comparand data to entries of the CAM to determine a matching CAM entry and asserting a match signal corresponding to the matching CAM entry. In response to asserting the match signal, the method further includes providing output data, an output parity bit, and an output complement parity bit from the RAM, using the comparand data to generate a generated parity bit, and providing an error indicator based on the generated parity bit, the output parity bit, and the output complement parity bit. The error indicator may indicate an error when the generated parity bit is not equal to the output parity bit or when the output parity bit is equal to the output complement parity bit. | 12-15-2011 |
20130265818 | WRITE CONTENTION-FREE, NOISE-TOLERANT MULTI-PORT BITCELL - A multi-port memory cell of a multi-port memory array includes a first inverter that inverter is disabled by a first subset of write word lines and a second inverter, cross coupled with the first inverter, wherein the second inverter is disabled by a second subset of the plurality of write word lines. A first selection circuit has data inputs coupled to a first subset of a plurality of write bit lines, selection inputs coupled to the first subset of the plurality of write word lines, and an output coupled to the input of the second inverter. The second selection circuit has data inputs coupled to a second subset of the plurality of write bit lines, selection inputs coupled to the second subset of the plurality of write word lines, and an output coupled to the input of the first inverter. | 10-10-2013 |
Amit Ashok, Tucson, AZ US
Patent application number | Description | Published |
---|---|---|
20120063690 | Object-Based Optical Character Recognition Pre-Processing Algorithm - A method of pre-processing a defocused image of an object includes applying an object-based sharpening filter on the defocused image to produce a sharper image; and quantizing the sharper image using block-wise quantization. A system for generating decoded text data from alphanumeric information printed upon an object includes a camera that obtains image data of the alphanumeric information. The system also includes a pre-processor that (a) performs block-wise quantization of the image data to form conditioned image data, and (b) performs optical character recognition on the conditioned image data to generate the decoded text data. | 03-15-2012 |
Amit Ashok, Boulder, CO US
Patent application number | Description | Published |
---|---|---|
20110064327 | Image Data Fusion Systems And Methods - Systems and methods for image data fusion include providing first and second sets of image data corresponding to an imaged first and second scene respectively. The scenes at least partially overlap in an overlap region, defining a first collection of overlap image data as part of the first set of image data, and a second collection of overlap image data as part of the second set of image data. The second collection of overlap image data is represented as a plurality of image data subsets such that each of the subsets is based on at least one characteristic of the second collection, and each subset spans the overlap region. A fused set of image data is produced by an image processor, by modifying the first collection of overlap image data based on at least a selected one of, but less than all of, the image data subsets. | 03-17-2011 |
Asokan Ashok, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20130283388 | METHOD AND SYSTEM FOR INFORMATION CONTENT VALIDATION IN ELECTRONIC DEVICES - Content validation on an electronic device comprises detecting information content on an electronic device and validating the information content in real time in the electronic device. Validating the information content includes analyzing the information content to detect selected content and preventing dissemination of the selected content via the electronic device. The information content comprises content originating and/or terminating on the electronic device. The electronic device may comprise a mobile electronic device. | 10-24-2013 |
20130283401 | INFORMATION CONTENT VALIDATION FOR ELECTRONIC DEVICES - A circuit device comprises a processing device connected to a memory. The processing device comprises a detection module that detects information content received in the memory from an electronic device. A validation module validates the information content in real time. Validating the information content includes analyzing the information content to detect selected content and preventing dissemination of the selected content from the electronic device. | 10-24-2013 |
Balasubramanyan Ashok, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20100306221 | EXTENDING RANDOM NUMBER SUMMATION AS AN ORDER-PRESERVING ENCRYPTION SCHEME - A method and system for cryptographically indexing, searching for, and retrieving documents is provided. In some embodiments, an encryption system is provided that generates a document index that allows users to retrieve documents by performing encrypted queries for keywords associated with the documents. In some embodiments, each keyword maps to the same number of encrypted document identifiers. In some embodiments, an extractor graph is employed to map an indication of each keyword to a number of buckets storing encrypted document identifiers. In some embodiments, an order-preserving encryption system is provided. The encryption system uses an ordered index that maps encrypted instances of ordered attribute values to documents that are associated with those values. The ordered index enables queries containing query operators that rely on order, such as less than (“<”) or greater than (“>”), to be successfully performed on encrypted attribute values. | 12-02-2010 |
Divya Ashok, Union City, CA US
Patent application number | Description | Published |
---|---|---|
20120016621 | METHOD AND SYSTEM FOR MULTI-MODE TESTING THROUGH OPERATION INTERFACE AND SCENARIO ABSTRACTION IN A MULTI-TENANT DATABASE ENVIRONMENT - Embodiments are described for a system and method for testing a hosted application through a test framework that uses the same operational test code for any one of a plurality of application interfaces. A method under embodiments defines a set of test operations comprising a test for the hosted application, each test operation interacting with the application through an interface of a plurality of interfaces; defines a set of test scenarios, with each test scenario including a number of generic test steps and test operations, and wherein each test scenario includes a function call to the test operation corresponding to the interface to be tested; and executes one or more of the test scenarios to implement a test on the interface to be tested for the hosted application. | 01-19-2012 |
Gopal Ashok, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20090216777 | MULTIPHASE TOPOLOGY-WIDE CODE MODIFICATIONS FOR PEER-TO-PEER SYSTEMS - Systems and methods that supply changes on-the-fly and without breaking execution of codes for schema changes in a peer-to-peer environment. The modification component supplies changes to peers or nodes in a topology by initially identifying dependencies (e.g., multiple level) of that can be affected by the schema change, followed by performing the schema change to the codes or stored procedures. Accordingly, dependencies in entire system can be refreshed, wherein multiple levels of dependencies can exist. | 08-27-2009 |
20100125557 | ORIGINATION BASED CONFLICT DETECTION IN PEER-TO-PEER REPLICATION - Systems and methods that enable conflict detection in a peer-to-peer replication by embedding origination information in data records. A tracing component can track embedded information in form of peer ID and transaction ID, wherein conflicts can be detected by comparing a pre-version (prior to current version) of data on the source node—with—a current version of the data on the destination node. | 05-20-2010 |
Guru S. Ashok, South Burlington, VT US
Patent application number | Description | Published |
---|---|---|
20080282091 | Systems and Methods of Securing Resources Through Passwords - Disclosed is a method of authorizing access to an item that maintains a lockout count and blocks access to the item if the lockout count exceeds a predetermined value. One feature is that the invention “variably” increments the lockout count if the presented password fails to exactly match the stored password. In this process the invention increments the lockout count different amounts depending upon how closely the presented password matches the stored password. The invention also provides a methodology that allocates a plurality of the same passwords to a plurality of users who share the same userid. The invention allows continuous operation of the item being accessed by providing that each of the passwords has a different expiration date. Also, when dealing with situations where a plurality of users who share the same userid also share the same password, the invention maps information associated with the users to the password in a data file and periodically updates the data file. | 11-13-2008 |
Pradeepkumar Ashok, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20120215450 | DISTINGUISHING BETWEEN SENSOR AND PROCESS FAULTS IN A SENSOR NETWORK WITH MINIMAL FALSE ALARMS USING A BAYESIAN NETWORK BASED METHODOLOGY - A method, system and computer program product for distinguishing between a sensor fault and a process fault in a physical system and use the results obtained to update the model. A Bayesian network is designed to probabilistically relate sensor data in the physical system which includes multiple sensors. The sensor data from the sensors in the physical system is collected. A conditional probability table is derived based on the collected sensor data and the design of the Bayesian network. Upon identifying anomalous behavior in the physical system, it is determined whether a sensor fault or a process fault caused the anomalous behavior using belief values for the sensors and processes in the physical system, where the belief values indicate a level of trust regarding the status of its associated sensors and processes not being faulty. | 08-23-2012 |
20140067352 | PRESENTING ATTRIBUTES OF INTEREST IN A PHYSICAL SYSTEM USING PROCESS MAPS BASED MODELING - A method, computer program product and system for presenting attributes of interest. A decision surface is created using process maps. The process maps are representative of system operational data from a plurality of sensors. A current operating point is identified including a location and a movement characteristic of the operating point. The location and the movement characteristic of the operating point are used to identify an attribute with a final probabilistic value assigned to the attribute. If the final probabilistic value for the attribute crosses a previously-defined threshold, an alarm is generated. The decision surfaces, the process maps, the current operating point, the predicted movement of the operating point, the attributes, and the alarms are visually represented in a data handling system to assist the operator in the real time monitoring and operation of the physical system. | 03-06-2014 |
Raksit Ashok, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20120102336 | Security of Program Executables and Microprocessors Based on Compiler-Architecture Interaction - A method, for use in a processor context, wherein instructions in a program executable are encoded with plural instruction set encodings. A method wherein a control instruction encoded with an instruction set encoding contains information about decoding of an instruction that is encoded with another instruction set encoding scheme. A method wherein instruction set encodings are randomly generated at compile time. A processor framework wherein an instruction is decoded during execution with the help of information provided by a previously decoded control instruction. | 04-26-2012 |
20140173262 | Energy-Focused Compiler-Assisted Branch Prediction - A processing system to reduce energy consumption and improve performance in a processor, controlled by compiler inserted information ahead of a selected branch instruction, to statically expose and control how the prediction should be completed and which mechanism should be used to achieve energy and performance efficiency. | 06-19-2014 |
Rohith Ashok, Apex, NC US
Patent application number | Description | Published |
---|---|---|
20110265082 | VIRTUAL IMAGE OVERLOADING FOR SOLUTION DEPLOYMENT - At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines. | 10-27-2011 |
20110271276 | AUTOMATED TUNING IN A VIRTUAL MACHINE COMPUTING ENVIRONMENT - Automatic optimization of application performance parameters is provided. This optimization may be provided by identifying the resource demands of applications using virtual resources, identifying the virtual resources that can be available to the applications, and allocating the virtual resources to the applications to be run on a virtual machine. | 11-03-2011 |
20120173866 | SYSTEM FOR SECURING VIRTUAL MACHINE DISKS ON A REMOTE SHARED STORAGE SUBSYSTEM - Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk. | 07-05-2012 |
20120173871 | SYSTEM FOR SECURING VIRTUAL MACHINE DISKS ON A REMOTE SHARED STORAGE SUBSYSTEM - Embodiments of the present invention provide a method, data processing system and computer program product for secure distribution of virtualized storage. In an embodiment of the invention, a method for secure distribution of virtualized storage in a host in a cloud computing can include composing at least one virtual machine (VM) disk in a secure container and configured to deploy VM images into a cloud computing environment, encrypting the composed at least one VM disk, transmitting the encrypted VM disk to a hypervisor in the cloud computing environment receiving a request to activate a VM instance and generating a bootloader in the secure container, transmitting the bootloader to the hypervisor in the cloud computing environment and providing a key to the bootloader to unlock the at least one VM disk. | 07-05-2012 |
20120174099 | AUTOMATED TUNING IN A VIRTUAL MACHINE COMPUTING ENVIRONMENT - Automatic optimization of application performance parameters is provided. This optimization may be provided by identifying the resource demands of applications using virtual resources, identifying the virtual resources that can be available to the applications, and allocating the virtual resources to the applications to be run on a virtual machine. | 07-05-2012 |
20120192185 | VIRTUAL IMAGE OVERLOADING FOR SOLUTION DEPLOYMENT - At least one master overloaded virtual image is deployed, by a virtual image configuration device, to a hypervisor cloud that includes a group of servers, each of the group of servers configured based upon a hypervisor platform to support at least one virtual machine. A service solution is instantiated as a group of virtual machines associated with at least one of the group of servers, based upon at least one master overloaded virtual image, where the service solution includes a platform agnostic pattern independent of the hypervisor platform. Startup is initiated for each of the instantiated group of virtual machines. | 07-26-2012 |
Rohith K. Ashok, Natick, MA US
Patent application number | Description | Published |
---|---|---|
20150261557 | RETURNING TERMINATED VIRTUAL MACHINES TO A POOL OF AVAILABLE VIRTUAL MACHINES TO BE REUSED THEREBY OPTIMIZING CLOUD RESOURCE USAGE AND WORKLOAD DEPLOYMENT TIME - A method, system and computer program product for optimizing cloud resources in utilizing a pool of virtual machines to service user workloads. A writeable partition is created to store middleware and user activity associated with a virtual machine obtained from a pool of available virtual machines to be deployed. In response to the obtained virtual machine being terminated, the contents of the created writeable partition are erased so that the data generated by the middleware and user activity will not be available for subsequent users. The virtual machine is later returned to the pool of available virtual machines after resetting its password and network address to a default state. In this manner, fewer cloud resources are used since resource intensive activities that were required in provisioning a new virtual machine can be eliminated since previously terminated virtual machines can be utilized in the pool of available virtual machines. | 09-17-2015 |
20150261561 | RETURNING TERMINATED VIRTUAL MACHINES TO A POOL OF AVAILABLE VIRTUAL MACHINES TO BE REUSED THEREBY OPTIMIZING CLOUD RESOURCE USAGE AND WORKLOAD DEPLOYMENT TIME - A method, system and computer program product for optimizing cloud resources in utilizing a pool of virtual machines to service user workloads. A writeable partition is created to store middleware and user activity associated with a virtual machine obtained from a pool of available virtual machines to be deployed. In response to the obtained virtual machine being terminated, the contents of the created writeable partition are erased so that the data generated by the middleware and user activity will not be available for subsequent users. The virtual machine is later returned to the pool of available virtual machines after resetting its password and network address to a default state. In this manner, fewer cloud resources are used since resource intensive activities that were required in provisioning a new virtual machine can be eliminated since previously terminated virtual machines can be utilized in the pool of available virtual machines. | 09-17-2015 |
20150304173 | MANAGING ISOLATION REQUIREMENTS OF A MULTI-NODE WORKLOAD APPLICATION - In an approach to manage isolation requirements of a multi-node workload application, a computer determines one or more first isolation levels for each of a plurality of workload nodes. The computer receives performance data for the plurality of workload nodes and analyzes the performance data for statistical trends in the performance data. The computer identifies an adverse trend in the statistical trends of the performance data and identifies a root cause of the adverse trend in the performance data. The computer then identifies one or more second isolation levels required to meet performance targets, the second isolation levels including an adjustment to the first isolation levels for the plurality of workload nodes. | 10-22-2015 |
20150304232 | MANAGING ISOLATION REQUIREMENTS OF A MULTI-NODE WORKLOAD APPLICATION - In an approach to manage isolation requirements of a multi-node workload application, a computer determines one or more first isolation levels for each of a plurality of workload nodes. The computer receives performance data for the plurality of workload nodes and analyzes the performance data for statistical trends in the performance data. The computer identifies an adverse trend in the statistical trends of the performance data and identifies a root cause of the adverse trend in the performance data. The computer then identifies one or more second isolation levels required to meet performance targets, the second isolation levels including an adjustment to the first isolation levels for the plurality of workload nodes. | 10-22-2015 |
20150370588 | SELECTING OPTIMAL HYPERVISOR PLATFORMS THAT SATISFY APPLICATION WORKLOAD REQUIREMENTS - A method, system and computer program product for selecting hypervisor platforms that are best suited to process application workloads. Attribute requirements for an application workload, such as high CPU capacity, high power and low cost, are received. A ranking algorithm is then applied to a list of pools of compute nodes to identify an ordered list of pools of compute nodes that are best suited for satisfying the attribute requirements of the application workload by comparing hypervisor characteristics of the pools of compute nodes with the attribute requirements of the application workload. Each pool of compute nodes runs on a particular hypervisor platform which has a unique combination of characteristics that correspond to a combination of a set of attribute requirements (e.g., medium CPU/memory/disk capacity; high CPU and memory performance). In this manner, the hypervisor platforms that are best suited for satisfying the application workload requirements are identified. | 12-24-2015 |
20150373093 | SELECTING OPTIMAL HYPERVISOR PLATFORMS THAT SATISFY APPLICATION WORKLOAD REQUIREMENTS - A method, system and computer program product for selecting hypervisor platforms that are best suited to process application workloads. Attribute requirements for an application workload, such as high CPU capacity, high power and low cost, are received. A ranking algorithm is then applied to a list of pools of compute nodes to identify an ordered list of pools of compute nodes that are best suited for satisfying the attribute requirements of the application workload by comparing hypervisor characteristics of the pools of compute nodes with the attribute requirements of the application workload. Each pool of compute nodes runs on a particular hypervisor platform which has a unique combination of characteristics that correspond to a combination of a set of attribute requirements (e.g., medium CPU/memory/disk capacity; high CPU and memory performance). In this manner, the hypervisor platforms that are best suited for satisfying the application workload requirements are identified. | 12-24-2015 |
Rohith K. Ashok, Durham, NC US
Patent application number | Description | Published |
---|---|---|
20140304437 | ALLOCATION AND BALANCING OF STORAGE RESOURCES - A method and technique for allocation and balancing of storage resources includes: determining, for each of a plurality of storage controllers, an input/output (I/O) latency value based on an I/O latency associated with each storage volume controlled by a respective storage controller; determining network bandwidth utilization and network latency values corresponding to each storage controller; responsive to receiving a request to allocate a new storage volume, selecting a storage controller having a desired I/O latency value; determining whether the network bandwidth utilization and network latency values for the selected storage controller are below respective network bandwidth utilization and network latency value thresholds; and responsive to determining that the network bandwidth utilization and network latency values for the selected storage controller are below the respective thresholds, allocating the new storage volume to the selected storage controller. | 10-09-2014 |
Rohith K. Ashok, Apex, NC US
Patent application number | Description | Published |
---|---|---|
20110161947 | VIRTUAL MACHINE MAINTENANCE WITH MAPPED SNAPSHOTS - A computer-implemented method, system and/or computer program product manage software maintenance software in a computer system. A first snapshot is taken of first system states of a computer system. The first snapshot is mapped to a first maintenance software, which is further mapped to a specific user. The computer system is instructed to install the first maintenance software in response to an installation request from the specific user. If the specific user subsequently requests that the first maintenance software be removed from the computer system, then the mappings of the first snapshot and the first maintenance software are used to revert the computer system back to the first system states. | 06-30-2011 |
20130132956 | VIRTUAL IMAGE OVERLOADING FOR SOLUTION DEPLOYMENT - An instantiable virtual machine part definition and part configuration metadata of an instantiable virtual machine capable of deployment as at least a portion of a service solution is received from a master overloaded virtual image. A determination is made as to whether to configure the instantiable virtual machine to reuse, using virtual image sharing, at least one portion of the master overloaded virtual image during deployment of the instantiable virtual machine within a service solution. A minimal executable virtual machine part core of the instantiable virtual machine that reuses, using the virtual image sharing, the at least one portion of the master overloaded virtual image during execution is identified. A minimal executable virtual machine part instantiable from the identified minimal executable virtual machine part core as the instantiable virtual machine is configured to utilize, using the virtual image sharing, a shared resource within the master overloaded virtual image during execution. | 05-23-2013 |
20130186956 | ACQUIRING INFORMATION DYNAMICALLY REGARDING A HARDWARE COMPONENT IN THE CLOUD COMPUTING SYSTEM WHILE ON THE FLOOR OF THE DATA CENTER - A method, system and computer program product for managing hardware components in a cloud computing environment. A mobile device captures an image of a bar code placed on a rack that is associated with an identifier that references an Internet resource of the management software that manages the rack. The mobile device transmits a request to the management software for information regarding a component in the rack, where the request includes a unique identifier (e.g., serial number) associated with the component. The management software uses the unique identifier to identify the component of interest and transmits information regarding the component of interest to the mobile device. In this manner, the client device can conveniently access the management software as well as conveniently acquire information dynamically from the management software about specific hardware components in these racks while the user is on the floor of the data center. | 07-25-2013 |
20130191527 | DYNAMICALLY BUILDING A SET OF COMPUTE NODES TO HOST THE USER'S WORKLOAD - A method, system and computer program product for dynamically building a set of compute nodes to host a user's workload. An administrative server receives workload definitions that include the types of workloads that are to be run in a cloud group as well as a number of instances of each workload the cloud group should support. These workload definitions are used to determine the virtual machine demands that the cloud group will place on the cloud environment. The administrative server further receives the demand constraints, placement constraints and license enforcement policies. The administrative server identifies a set of compute nodes to host the user's workload based on the virtual machines demands, the demand constraints, the placement constraints and the license enforcement policies. In this manner, a set of compute nodes is dynamically built for consideration in forming a cloud group without the user requiring knowledge of the cloud's composition. | 07-25-2013 |
20130191543 | PERFORMING MAINTENANCE OPERATIONS ON CLOUD COMPUTING NODE WITHOUT REQUIRING TO STOP ALL VIRTUAL MACHINES IN THE NODE - A method, system and computer program product for performing maintenance operations on a cloud computing node. An administrative server receives an indication that a maintenance operation is to be performed on a cloud computing node. The administrative server identifies which virtual machine(s) on the cloud computing node will be affected by the maintenance operation. The administrative server relocates the virtual machine(s) to be affected by the maintenance operation to other suitable cloud computing node(s) prior to the maintenance operation being performed. The administrative server then performs the maintenance operation on the cloud computing node. The virtual machine(s) may be relocated back to the cloud computing node after the maintenance operation is completed in response to a need to rebalance resources in such a manner. In this manner, maintenance operations may be performed on a cloud computing node without requiring to stop all the virtual machines in the node. | 07-25-2013 |
20130204918 | COMPUTING ENVIRONMENT CONFIGURATION AND INITIALIZATION - According to one aspect of the present disclosure a method and technique for automatically configuring a set of resources for deployment as a computing environment is disclosed. The method includes: executing a configuration management application, the configuration management application configured to automatically connect to and discover each hardware element forming a networked set of resources; determine whether each discovered hardware element is specified for the computing environment; responsive to determining that each discovered hardware element is specified for the computing environment, determine a configuration setting for each respective discovered hardware element; responsive to determining that the configuration setting of the discovered hardware element conflicts with a desired configuration setting for deployment of the discovered hardware element, automatically configure the discovered hardware element to the desired configuration setting; and automatically load and configure a management interface to enable deployment of the networked set of resources as a computing environment. | 08-08-2013 |
20130204960 | ALLOCATION AND BALANCING OF STORAGE RESOURCES - A method and technique for allocation and balancing of storage resources includes: determining, for each of a plurality of storage controllers, an input/output (I/O) latency value based on an I/O latency associated with each storage volume controlled by a respective storage controller; determining network bandwidth utilization and network latency values corresponding to each storage controller; responsive to receiving a request to allocate a new storage volume, selecting a storage controller having a desired I/O latency value; determining whether the network bandwidth utilization and network latency values for the selected storage controller are below respective network bandwidth utilization and network latency value thresholds; and responsive to determining that the network bandwidth utilization and network latency values for the selected storage controller are below the respective thresholds, allocating the new storage volume to the selected storage controller. | 08-08-2013 |
20130205005 | ALLOCATION AND BALANCING OF STORAGE RESOURCES - A system and technique for allocating and balancing storage resources includes: a plurality of storage controllers each controlling one or more storage volumes, and a processor unit operable to execute a management application to: determine, for each controller, an input/output (I/O) latency value based on an I/O latency associated with each storage volume controlled by a respective controller; determine network bandwidth utilization and network latency values corresponding to each controller; responsive to a request to allocate a new storage volume, select a controller having a desired I/O latency value; determine whether the network bandwidth utilization and network latency values for the selected controller are below respective network bandwidth utilization and network latency value thresholds; and responsive to determining that the network bandwidth utilization and network latency values for the selected controller are below respective thresholds, allocate the new storage volume to the selected controller. | 08-08-2013 |
20130221096 | ACQUIRING INFORMATION DYNAMICALLY REGARDING A HARDWARE COMPONENT IN THE CLOUD COMPUTING SYSTEM WHILE ON THE FLOOR OF THE DATA CENTER - A method, system and computer program product for managing hardware components in a cloud computing environment. A mobile device captures an image of a bar code placed on a rack that is associated with an identifier that references an Internet resource of the management software that manages the rack. The mobile device transmits a request to the management software for information regarding a component in the rack, where the request includes a unique identifier (e.g., serial number) associated with the component. The management software uses the unique identifier to identify the component of interest and transmits information regarding the component of interest to the mobile device. In this manner, the client device can conveniently access the management software as well as conveniently acquire information dynamically from the management software about specific hardware components in these racks while the user is on the floor of the data center. | 08-29-2013 |
20130227131 | DYNAMICALLY BUILDING A SET OF COMPUTE NODES TO HOST THE USER'S WORKLOAD - A method, system and computer program product for dynamically building a set of compute nodes to host a user's workload. An administrative server receives workload definitions that include the types of workloads that are to be run in a cloud group as well as a number of instances of each workload the cloud group should support. These workload definitions are used to determine the virtual machine demands that the cloud group will place on the cloud environment. The administrative server further receives the demand constraints, placement constraints and license enforcement policies. The administrative server identifies a set of compute nodes to host the user's workload based on the virtual machines demands, the demand constraints, the placement constraints and the license enforcement policies. In this manner, a set of compute nodes is dynamically built for consideration in forming a cloud group without the user requiring knowledge of the cloud's composition. | 08-29-2013 |
20130232268 | PERFORMING MAINTENANCE OPERATIONS ON CLOUD COMPUTING NODE WITHOUT REQUIRING TO STOP ALL VIRTUAL MACHINES IN THE NODE - A method, system and computer program product for performing maintenance operations on a cloud computing node. An administrative server receives an indication that a maintenance operation is to be performed on a cloud computing node. The administrative server identifies which virtual machine(s) on the cloud computing node will be affected by the maintenance operation. The administrative server relocates the virtual machine(s) to be affected by the maintenance operation to other suitable cloud computing node(s) prior to the maintenance operation being performed. The administrative server then performs the maintenance operation on the cloud computing node. The virtual machine(s) may be relocated back to the cloud computing node after the maintenance operation is completed in response to a need to rebalance resources in such a manner. In this manner, maintenance operations may be performed on a cloud computing node without requiring to stop all the virtual machines in the node. | 09-05-2013 |
20130297772 | UNIFIED CLOUD COMPUTING INFRASTRUCTURE TO MANAGE AND DEPLOY PHYSICAL AND VIRTUAL ENVIRONMENTS - A method, system and computer program product for managing and deploying physical and virtual environments across multiple hardware platforms. A single unit, referred to herein as a cloud construction block, contains both the hardware and software components used to build a cloud computing environment. By having such a single unit contain both the hardware and software components needed to build a cloud computing environment, the user no longer needs to purchase and integrate different hardware and software components. Furthermore, the cloud construction block contains modular pieces of hardware, such as compute hardware, memory hardware, storage hardware and network hardware, that are integrated with management software configured to manage both the hardware and the cloud computing environment in a seamlessly integrated package. Since there is a single management system, the management software allows the user to manage the modular pieces of hardware via a single user interface. | 11-07-2013 |
20130297773 | UNIFIED CLOUD COMPUTING INFRASTRUCTURE TO MANAGE AND DEPLOY PHYSICAL AND VIRTUAL ENVIRONMENTS - A method, system and computer program product for managing and deploying physical and virtual environments across multiple hardware platforms. A single unit, referred to herein as a cloud construction block, contains both the hardware and software components used to build a cloud computing environment. By having such a single unit contain both the hardware and software components needed to build a cloud computing environment, the user no longer needs to purchase and integrate different hardware and software components. Furthermore, the cloud construction block contains modular pieces of hardware, such as compute hardware, memory hardware, storage hardware and network hardware, that are integrated with management software configured to manage both the hardware and the cloud computing environment in a seamlessly integrated package. Since there is a single management system, the management software allows the user to manage the modular pieces of hardware via a single user interface. | 11-07-2013 |
20140006741 | Computing Processor Resources for Logical Partition Migration | 01-02-2014 |
20140007124 | Computing Processor Resources for Logical Partition Migration | 01-02-2014 |
20140052945 | OPTIMIZING STORAGE SYSTEM BEHAVIOR IN VIRTUALIZED CLOUD COMPUTING ENVIRONMENTS BY TAGGING INPUT/OUTPUT OPERATION DATA TO INDICATE STORAGE POLICY - A method, system and computer program product for optimizing storage system behavior in a cloud computing environment. An Input/Output (I/O) operation data is appended with a tag, where the tag indicates a class of data for the I/O operation data. Upon the storage controller reviewing the tag appended to the I/O operation data, the storage controller performs a table look-up for the storage policy associated with the determined class of data. The storage controller applies a map to determine a storage location for the I/O operation data in a drive device, where the map represents a logical volume which indicates a range of block data that is to be excluded for being stored on the drive device and a range of block data that is to be considered for being stored on the drive device. In this manner, granularity of storage policies is provided in a cloud computing environment. | 02-20-2014 |
20140059542 | OPTIMIZING VIRTUAL MACHINE DEPLOYMENT TIME BY TEMPORARILY ALLOCATING MORE PROCESSING RESOURCES DURING THE INITIAL DEPLOYMENT TIME OF THE VIRTUAL MACHINE - A method, system and computer program product for optimizing virtual machine deployment time. A cloud controller receives a request from a user to configure a virtual machine with a designated CPU capacity. If the designated CPU capacity is less than or equal to a threshold, then the cloud controller determines if there are additional cloud resources available to be allocated to deploy the virtual machine. If so, then the cloud controller allocates additional CPU capacity to the designated CPU capacity to be used to provision the virtual machine thereby enabling a multithreaded startup to initialize the operating system and middleware tiers so as to reduce the deployment time of the virtual machine. The additional resources would only be available during the initial deployment time of the virtual machine and removed before the user is granted access to the system when it comes online. | 02-27-2014 |
20140068600 | PROVIDING A SEAMLESS TRANSITION FOR RESIZING VIRTUAL MACHINES FROM A DEVELOPMENT ENVIRONMENT TO A PRODUCTION ENVIRONMENT - A method, system and computer program product for providing a seamless transition for resizing virtual machines from a development environment to a production environment. An administrative server receives an instruction from a customer to resize a virtual machine running on a cloud computing node, where the resized virtual machine requires physical resources (e.g., twenty physical processor cores) to be utilized in the production environment. Instead of the administrative server utilizing the same number of physical resources in the development environment that need to be utilized in the production environment, the administrative server utilizes a fewer number of physical resources by also utilizing virtual resources (e.g., twenty virtual processor cores and only two physical processor cores) so as to provide a development environment with the same resource capacity as the production environment but with fewer physical resources thereby more efficiently utilizing the physical resources on the cloud computing node. | 03-06-2014 |
20140149421 | DYNAMICALLY QUANTIFYING THE DEMAND OF EACH SOFTWARE COMPONENT OF EACH SOFTWARE STACK DEPLOYED IN THE CLOUD ENVIRONMENT - A method, system and computer program product for dynamically quantifying a demand for the software components deployed in a cloud environment. An administrative server generates a table mapping the software levels of the software components of the deployed software stacks with the number of instances of the deployed software stacks tracked over a period of time. The depth weight based on subtracting a depth index (zero-based) from a depth size is calculated for each software component, where a depth index refers to the software level of the software component in question and a depth size refers to the number of software levels for the software stack bearing the software component in question. A metric used in quantifying the demand for the software component (“popularity index”) is then determined for each software component based on the number of deployed instances and the depth weight for that software component. | 05-29-2014 |
20140157038 | USING SEPARATE PROCESSES TO HANDLE SHORT-LIVED AND LONG-LIVED JOBS TO REDUCE FAILURE OF PROCESSES - A method, system and computer program product for reducing the failure of processes. After a job is received, a determination is made as whether the received job is a “short-lived job” or a “long-lived job.” A short-lived job refers to a job who accomplishes a given task in less than a threshold period of time. A long-lived job refers to a job who accomplishes a given task in greater than a threshold period of time. For an identified long-lived job, the long-lived job is executed on a single process apart from other processes; whereas, the short-lived job is executed on at least one process separate from the processes executing long-lived jobs. As a result of executing the long-lived jobs on separate processes from the short-lived jobs, the likelihood of having a process fail is lessened since the duration of time that the process is running will be lessened. | 06-05-2014 |
20140201365 | IMPLEMENTING A PRIVATE NETWORK ISOLATED FROM A USER NETWORK FOR VIRTUAL MACHINE DEPLOYMENT AND MIGRATION AND FOR MONITORING AND MANAGING THE CLOUD ENVIRONMENT - A method, system and computer program product for optimizing quality of service settings for virtual machine deployment and migration. A first network (e.g., user network) is provided that is dedicated to running user workloads deployed on virtual machines. A second network (e.g., cloud management network), isolated from the first network, is also provided that is dedicated to virtual machine deployment and migration. As a result of the first and second networks not being shared, the administrative server utilizes unique quality of service settings for virtual machine deployment and migration supported by the second network that would otherwise not be possible if the first and second networks were shared. | 07-17-2014 |
20140223222 | INTELLIGENTLY RESPONDING TO HARDWARE FAILURES SO AS TO OPTIMIZE SYSTEM PERFORMANCE - A method, system and computer program product for intelligently responding to hardware failures so as to optimize system performance. An administrative server monitors the utilization of the hardware as well as the software components running on the hardware to assess a context of the software components running on the hardware. Upon detecting a hardware failure, the administrative server analyzes the hardware failure to determine the type of hardware failure and analyzes the properties of the workload running on the failed hardware. The administrative server then responds to the detected hardware failure based on various factors, including the type of the hardware failure, the properties of the workload running on the failed hardware and the context of the software running on the failed hardware. In this manner, by taking into consideration such factors in responding to the detected hardware failure, a more intelligent response is provided that optimizes system performance. | 08-07-2014 |
20140223241 | INTELLIGENTLY RESPONDING TO HARDWARE FAILURES SO AS TO OPTIMIZE SYSTEM PERFORMANCE - A method, system and computer program product for intelligently responding to hardware failures so as to optimize system performance. An administrative server monitors the utilization of the hardware as well as the software components running on the hardware to assess a context of the software components running on the hardware. Upon detecting a hardware failure, the administrative server analyzes the hardware failure to determine the type of hardware failure and analyzes the properties of the workload running on the failed hardware. The administrative server then responds to the detected hardware failure based on various factors, including the type of the hardware failure, the properties of the workload running on the failed hardware and the context of the software running on the failed hardware. In this manner, by taking into consideration such factors in responding to the detected hardware failure, a more intelligent response is provided that optimizes system performance. | 08-07-2014 |
20140223443 | DETERMINING A RELATIVE PRIORITY FOR A JOB USING CONTEXT AND ENVIRONMENTAL CONSIDERATIONS - A method, system and computer program product for determining a relative priority for a job. A “policy” is selected based on the job itself and the reason that the job is being executed, where the policy includes a priority range for the job and for an application. A priority for the job that is within the priority range of the job as established by the selected policy is determined based on environmental and context considerations. This job priority is then adjusted based on the priority of the application (within the priority range as established by the policy) becoming the job's final priority. By formulating a priority that more accurately reflects the true priority or importance of the job by taking into consideration the environmental and context considerations, job managers will now be able to process these jobs in a more efficient manner. | 08-07-2014 |
20140223521 | ALLOWING ACCESS TO UNDERLYING HARDWARE CONSOLES TO CORRECT PROBLEMS EXPERIENCING BY USER - A method, system and computer program product for providing access to underlying hardware consoles to correct problems experiencing by a user. The administrative server receives a request from the user to access a managing system configured to provide access to the underlying hardware consoles that are combined together to service a user's computing requirements. The administrative server presents a list of managing systems for the user to connect that were identified as being able to address the problem(s) the user is experiencing. The administrative server then enables access to managing systems selected in the list in response to the user providing appropriate authentication credentials. An interface is then provided to the user by the selected managing systems to select the underlying hardware consoles to access. In this manner, the user is provided access to the underlying hardware consoles in an easy manner without presenting numerous options and configurations. | 08-07-2014 |
20140297893 | EMULATING MULTIPLE UNIVERSAL SERIAL BUS (USB) KEYS SO AS TO EFFICIENTLY CONFIGURE DIFFERENT TYPES OF HARDWARE - A method, system and computer program product for efficiently configuring different types of hardware components. A computing device is connected to a hardware component to be configured. The computing device detects the type of the hardware component upon being connected to the hardware component. The computing device then identifies a profile from among multiple profiles associated with the detected type of hardware component, where each profile contains a configuration file(s) for configuring its associated type of hardware component. Upon identifying the profile associated with the connected hardware component, the computing device emulates a Universal Serial Bus (USB) key presenting the configuration file(s) contained in the identified profile to the detected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the computing device emulate multiple USB keys. | 10-02-2014 |
20140297894 | UNIVERSAL SERIAL BUS (USB) KEY FUNCTIONING AS MULTIPLE USB KEYS SO AS TO EFFICIENTLY CONFIGURE DIFFERENT TYPES OF HARDWARE - A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys. | 10-02-2014 |
20140297895 | UNIVERSAL SERIAL BUS (USB) KEY FUNCTIONING AS MULTIPLE USB KEYS SO AS TO EFFICIENTLY CONFIGURE DIFFERENT TYPES OF HARDWARE - A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys. | 10-02-2014 |
20140298487 | MULTI-USER UNIVERSAL SERIAL BUS (USB) KEY WITH CUSTOMIZABLE FILE SHARING PERMISSIONS - A method, data storage device and computer program product for having multiple users share a single data storage device securely. A data storage device, such as a Universal Serial Bus (USB) key, is plugged into a computing device. A USB controller of the USB key recognizes the computing device and creates an account for the user. The created account is associated with the user as well as associated with the computing device. Data uploaded to the USB key by the user is then associated with the created account. Only that user will be able to view that data on his/her computing device (computing device associated with the created account) unless the user indicates to share that data with other users. Such a process may be repeated each time the USB key is plugged into a different computing device thereby creating multiple accounts associated with multiple computing devices and users. | 10-02-2014 |
20140298489 | MULTI-USER UNIVERSAL SERIAL BUS (USB) KEY WITH CUSTOMIZABLE FILE SHARING PERMISSIONS - A method, data storage device and computer program product for having multiple users share a single data storage device securely. A data storage device, such as a Universal Serial Bus (USB) key, is plugged into a computing device. A USB controller of the USB key recognizes the computing device and creates an account for the user. The created account is associated with the user as well as associated with the computing device. Data uploaded to the USB key by the user is then associated with the created account. Only that user will be able to view that data on his/her computing device (computing device associated with the created account) unless the user indicates to share that data with other users. Such a process may be repeated each time the USB key is plugged into a different computing device thereby creating multiple accounts associated with multiple computing devices and users. | 10-02-2014 |
20140372497 | DETERMINING LOCATION OF HARDWARE COMPONENTS IN A CLOUD COMPUTING ENVIRONMENT BASED ON HARDWARE COMPONENTS SELF-LOCATING OTHER HARDWARE COMPONENTS - A method, system and computer program product for managing hardware components in a cloud computing environment. Each hardware component in a data center of the cloud computing environment detects and identifies other hardware components within a communication range of the hardware component using a wireless protocol. Furthermore, each hardware component determines its actual location as well as its relative location with respect to the detected hardware components, such as based on a triangulation of the wireless signals. Such information is transmitted to an administrative server. An inventory of the hardware components in the data center, including their current location, is then compiled by the administrative server. In this manner, a hardware component can be more easily located after being relocated in the data center. Furthermore, the administrative server will be able to balance a workload across these hardware components based on their location. | 12-18-2014 |
20140372595 | DETERMINING LOCATION OF HARDWARE COMPONENTS IN A CLOUD COMPUTING ENVIRONMENT BASED ON HARDWARE COMPONENTS SELF-LOCATING OTHER HARDWARE COMPONENTS - A method, system and computer program product for managing hardware components in a cloud computing environment. Each hardware component in a data center of the cloud computing environment detects and identifies other hardware components within a communication range of the hardware component using a wireless protocol. Furthermore, each hardware component determines its actual location as well as its relative location with respect to the detected hardware components, such as based on a triangulation of the wireless signals. Such information is transmitted to an administrative server. An inventory of the hardware components in the data center, including their current location, is then compiled by the administrative server. In this manner, a hardware component can be more easily located after being relocated in the data center. Furthermore, the administrative server will be able to balance a workload across these hardware components based on their location. | 12-18-2014 |
20150016000 | PREVENTING MOISTURE DAMAGE TO A DEVICE - A device including a system for preventing moisture damage to the device includes a processor and a module operable on the processor for monitoring for a predetermined capacitance criterion on a surface of the device. The device is automatically powered off in response to detecting the predetermined capacitance criterion. | 01-15-2015 |
20150016001 | PREVENTING MOISTURE DAMAGE TO A DEVICE - A method, device and computer program product for preventing moisture damage to electronic circuitry of a device may include monitoring for a predetermined capacitance criterion on a surface of the device; and automatically powering off the device in response to detecting the predetermined capacitance criterion. | 01-15-2015 |
Rohith Kottamangalam Ashok, Medway, MA US
Patent application number | Description | Published |
---|---|---|
20160034929 | Computerized Method for Extrapolating Customer Sentiment - Method and systems are provided to extrapolate customer sentiment from interactions that customers have with an organization. Customer interaction data can include performance indication data, customer interface data, status of accounts data, and/or customer survey data. For each customer an overall sentiment score is determined. The overall sentiment score can be based on a positive or negative score that is determined for each data item within the customer interaction data. | 02-04-2016 |
Rohith Kottamangalam Ashok, Apex, NC US
Patent application number | Description | Published |
---|---|---|
20090019108 | SYSTEM AND METHOD FOR APPLICATION SERVER/OPERATING SYSTEM NETWORK/CONFIGURATION MANAGEMENT - The invention discloses a system and method for network application server/operating system management by packaging configuration function(s) into independently partitioned profiles (or “silos”) that can be dynamically invoked by an “administrative agent” server/program using a “proxy server”/program to distribute profile configuration changes to one or more administrative agents (each of which is assigned one or more application servers/systems). | 01-15-2009 |
20090083405 | MAXIMIZING APPLICATION AVAILABILITY DURING AUTOMATED ENTERPRISE DEPLOYMENTS - A method of deploying enterprise applications or updates to data processing systems in a complex data processing environment. The enterprise applications or updates are phase deployed to the target data processing systems. Phased deployment includes the steps of preparing one affected node, quiescing all affected servers in the node, stopping all affected servers in the node, synchronizing the node, delivering the applications or updates, starting all affected servers, reactivating all affected servers, restoring the affected node, and repeating these steps for each affected node one at a time until all targeted data processing systems have been affected. | 03-26-2009 |
20110258441 | Secure Access to a Virtual Machine - A method for providing secure access to a virtual machine includes dispensing an image corresponding to a virtual machine from a management appliance to a distributed computing system such that the virtual machine is implemented by at least one of a plurality of interconnected physical computing devices in the distributed computing system; establishing a trusted relationship between the management appliance and the virtual machine; and providing a user with access to the virtual machine from the management appliance without further authentication credentials from the user. | 10-20-2011 |
20120173872 | Secure Access to a Virtual Machine - A method for providing secure access to a virtual machine includes dispensing an image corresponding to a virtual machine from a management appliance to a distributed computing system such that the virtual machine is implemented by at least one of a plurality of interconnected physical computing devices in the distributed computing system; establishing a trusted relationship between the management appliance and the virtual machine; and providing a user with access to the virtual machine from the management appliance without further authentication credentials from the user. | 07-05-2012 |
20130191827 | SYSTEM AND METHOD TO REDUCE MEMORY USAGE BY OPTIMALLY PLACING VMS IN A VIRTUALIZED DATA CENTER - Embodiments of the present invention provide a method, system and computer program product for collocating VMs based on memory sharing potential. In an embodiment of the invention, a VM co-location method has been claimed. The method includes selecting a VM from amongst different VMs for server colocation. The method additionally includes computing an individual shared memory factor for each of a set of the VMs with respect to the selected VM. The method yet further includes determining a VM amongst the VMs in the set associated with a highest computed shared memory factor. Finally, the method includes co-locating the determined VM with the selected VM in a single server. | 07-25-2013 |
20130232501 | SYSTEM AND METHOD TO REDUCE MEMORY USAGE BY OPTIMALLY PLACING VMS IN A VIRTUALIZED DATA CENTER - Embodiments of the present invention provide a method, system and computer program product for collocating VMs based on memory sharing potential. In an embodiment of the invention, a VM co-location method has been claimed. The method includes selecting a VM from amongst different VMs for server colocation. The method additionally includes computing an individual shared memory factor for each of a set of the VMs with respect to the selected VM. The method yet further includes determining a VM amongst the VMs in the set associated with a highest computed shared memory factor. Finally, the method includes co-locating the determined VM with the selected VM in a single server. | 09-05-2013 |
S. Ashok, State College, PA US
Patent application number | Description | Published |
---|---|---|
20100213477 | Light Emitting Apparatus - A light emitting apparatus may include a gate metal positioned between a p-type contact and an n-type contact, a gate oxide or other dielectric stack positioned below and attached to the gate metal, a Ge or Si | 08-26-2010 |
S. Ashok, University Park, PA US
Patent application number | Description | Published |
---|---|---|
20080251862 | ACCUMULATION FIELD EFFECT MICROELECTRONIC DEVICE AND PROCESS FOR THE FORMATION THEREOF - A gated microelectronic device is provided that has a source with a source ohmic contact with the source characterized by a source dopant type and concentration. A drain with a drain ohmic contact with the drain characterized by a drain dopant type and concentration. An intermediate channel portion characterized by a channel portion dopant type and concentration. An insulative dielectric is in contact with the channel portion and overlaid in turn by a gate. A gate contact applies a gate voltage bias to control charge carrier accumulation and depletion in the underlying channel portion. This channel portion has a dimension normal to the gate which is fully depleted in the off-state. The dopant type is the same across the source, drain and the channel portion of the device. The device on-state current is determined by the doping and, unlike a MOSFET, is not directly proportional to device capacitance. | 10-16-2008 |
Satish Ashok, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20140219086 | SYSTEM AND METHOD FOR DISTRIBUTED NETFLOW EXPORTER WITH A SINGLE IP ENDPOINT IN A NETWORK ENVIRONMENT - An example method for a distributed NetFlow exporter with a single IP endpoint in a network environment is provided and includes configuring a network protocol stack of an exporter with switched virtual interface (SVI) state information of an SVI associated with a switch in a network, retrieving flow data from a NetFlow cache, and communicating the flow data to a collector according to the configured network protocol stack. Although the communication bypasses the SVI, the collector perceives the flow records as being communicated by the SVI. The SVI state information includes a public Internet Protocol (IP) address and a Media Access Control (MAC) address of the SVI, where the exporter executes on an adaptor of a server in the network. The method also includes configuring a destination IP address and a destination MAC address on the exporter according to a NetFlow policy. | 08-07-2014 |
Shamsundar Ashok, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20080271037 | METHOD AND APPARATUS FOR LOAD BALANCE SERVER MANAGEMENT - A computer implemented method, apparatus, and computer usable program code for balancing management loads. Loads are analyzed for a plurality of hardware control points to form an analysis in response to receiving a notification from a hardware control point indicating that a new manageable data processing system has been discovered. One of the plurality of hardware control points is selected using the analysis to form a selected hardware control point. The message is sent to the selected hardware control point to manage the new manageable data processing system, wherein the selected hardware control point manages the new manageable data processing system. | 10-30-2008 |
20080285551 | Method, Apparatus, and Computer Program Product for Implementing Bandwidth Capping at Logical Port Level for Shared Ethernet Port - Bandwidth capping is implemented at a logical port level for a shared Ethernet port. When a physical port of a Host Ethernet Adapter (HEA) is partitioned, a Logical HEA is created for the partition. One or a plurality of Logical Ports (LPorts) is created in the Logical HEA. Each LPort is mapped to a corresponding physical port. During LPAR configuration, a minimum guaranteed speed is specified for the LPort together with the corresponding physical port for the LPort and an optional maximum speed. The specified configuration for the LPort is verified, and the configuration values are stored in the HEA and the HEA dispatches data packets based upon the stored configuration values for the LPort. | 11-20-2008 |
20100122249 | ON-DEMAND ALLOCATION OF VIRTUAL ASYNCHRONOUS SERVICES INTERFACES - An on-demand allocation of virtual asynchronous services interface adapters is provided. A determination is made as to whether an operation request requires that a set of virtual I/O service partitions have a required number of virtual asynchronous services interface adapters. If a required number of virtual asynchronous services interface adapters is required, a determination is made as to whether the set of virtual I/O service partitions have the required number of virtual asynchronous services interface adapters. Responsive to a failure to have the required number of virtual asynchronous services interface adapters, a set of new virtual asynchronous services interface adapters is defined in partition management firmware and in the set of virtual I/O service partitions. The set of new virtual asynchronous services interface adapters is configured in the set of virtual I/O service partitions and the operation is issued to the set of virtual I/O service partitions. | 05-13-2010 |
20120084768 | Capturing Multi-Disk Virtual Machine Images Automatically - A plurality of virtual disk images are established on a virtual machine. The virtual machine identifies corresponding network address translations for a plurality of disks, each having a corresponding plurality of data sets. The virtual machine installs the corresponding plurality of data sets to the plurality of virtual disks using the corresponding network address translations. An image of the plurality of disks is created, wherein the image contains the plurality of virtual disks with the plurality of data sets. | 04-05-2012 |
Somasundaram Ashok, University Park, PA US
Patent application number | Description | Published |
---|---|---|
20130285149 | ACCUMULATION FIELD EFFECT MICROELECTRONIC DEVICE AND PROCESS FOR THE FORMATION THEREOF - A gated microelectronic device is provided that has a source with a source ohmic contact with the source characterized by a source dopant type and concentration. A drain with a drain ohmic contact with the drain characterized by a drain dopant type and concentration. An intermediate channel portion characterized by a channel portion dopant type and concentration. An insulative dielectric is in contact with the channel portion and overlaid in turn by a gate. A gate contact applies a gate voltage bias to control charge carrier accumulation and depletion in the underlying channel portion. This channel portion has a dimension normal to the gate which is fully depleted in the off-state. The dopant type is the same across the source, drain and the channel portion of the device. The device on-state current is determined by the doping and, unlike a MOSFET, is not directly proportional to device capacitance. | 10-31-2013 |
Srinivas Ashok, Oakland, CA US
Patent application number | Description | Published |
---|---|---|
20140195930 | PERSISTENT FEEDER COMPONENT FOR DISPLAYING FEED ITEMS RECEIVED FROM INFORMATION FEEDS OF ONLINE SOCIAL NETWORKS - Disclosed are methods, apparatus, systems, and computer readable storage media for providing a persistent feeder component in a user interface to display in near real-time feed items when received in information feeds of online social networks. The feed items can come from feeds of multiple online social networks to be displayed in a single feeder component, and the feeder component may be configured to display proximate to each feed item a graphical indicator identifying the information feed of the feed item. The feeder component can be displayed in one of multiple display formats. The feeder component may also be configured to track activity on an online social network and display a notification when activity on the online social network has met one or more milestones determined by the user. | 07-10-2014 |