Chacko
Binny Chacko, Kerala IN
Patent application number | Description | Published |
---|---|---|
20100082388 | METHOD AND SYSTEM FOR MANAGING INFORMATION TECHNOLOGY (IT) INFRASTRUCTURAL ELEMENTS - The present invention provides a method, system and computer program product for managing the Information Technology (IT) infrastructural elements of multiple organizations. The system monitors various IT infrastructural elements, such as networks, operating systems, databases, and software applications of multiple organizations. Alerts corresponding to various issues related to the IT infrastructural elements are generated. Based on the alerts, the system provides information related to the issues to a support team for solving them. | 04-01-2010 |
Bobby Chacko, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110191217 | APPROVAL WORKFLOW ENGINE FOR SERVICES PROCUREMENT TIMESHEETS, PROGRESS LOGS, AND EXPENSES - This disclosure describes, generally, methods and systems for implementing an approval workflow engine and approval framework for timesheets, progress logs, and expenses. The method includes receiving, at an approval engine of an application server, information representing a timesheet, progress log, or expense. The approval engine may apply one or more rules to determine whether the rules are satisfied by corresponding attribute values of attributes for the timesheet, progress log, or expense. Notification may be generated and transmitted to one or more approvers and/or reviewers based on applications of the rules. An indication of approval and/or disapproval may be received from each of the approvers and/or reviewers. Rules may be defined for automatic assignment of multi level approvers, based on specific attributes. An approver may have the option to approve, deny, or push back a transaction. Approvers and submitters can have visibility of the full approval path and current approval status throughout an approval process. In addition, post approval adjustments can be routed for approval based on adjustment approval rules. | 08-04-2011 |
Joseph Chacko, Sheffield GB
Patent application number | Description | Published |
---|---|---|
20080313266 | PROCESSING SERVICE REQUESTS IN A DISTRIBUTED ENVIRONMENT - A computer-implemented method for processing service requests in a distributed environment includes routing a type of service request to a first service provider in the distributed environment, the first service provider having a commitment level for handling the service request type, detecting a second service provider in the distributed environment capable of handing the service request type, determining a commitment level of the second service provider to handle the service request type, and responsive to the commitment level of the second provider exceeding the commitment level of the first provider, routing the service request type to the second service provider. | 12-18-2008 |
Joseph Chacko, Hampshire GB
Patent application number | Description | Published |
---|---|---|
20110271288 | OBJECT REQUEST BROKER - An object request broker (ORB) for receiving an incoming message including a message header and a message body in General Inter-ORB Protocol (GIOP) type format, the ORB comprising: an external ORB element for converting the header of the incoming message to an implementation-specific format, and for providing the header in implementation-specific format with the body in GIOP type format to a distribution mechanism for identifying an appropriate target server for processing the body of the incoming message; and an internal ORB element associated with the identified target server for converting the body of the incoming message to an implementation-specific format for use by the target server to process the message. | 11-03-2011 |
Joseph K. Chacko, Hampshire GB
Patent application number | Description | Published |
---|---|---|
20090064184 | PRE-POPULATION OF META DATA CACHE FOR RESOLUTION OF DATA MARSHALING ISSUES - In a data processing system, objects (in the object oriented sense of the word) are instantiated through the use of transmitted data which is marshaled and demarshaled through the use of protocols that acquire meta data for the transmitted data through the use of an already existing cache of such meta data which has proper content meeting version requirements as specified by an implementation key associated with the object. This eliminates the need for call back requests that may or may not succeed because of the presence of a firewall in a yet-to-be-established connection. A tool is provided for structuring the data, first on disk and then later in a more readily available portion of an active memory. | 03-05-2009 |
Joseph K. Chacko, Sheffield GB
Patent application number | Description | Published |
---|---|---|
20090254800 | METHOD FOR PROVIDING USER-DEFINITIONS OF TERMS - The present disclosure is a method for providing user-definitions of terms associated with a document. A method for providing user-definitions of terms may include providing a document, receiving text, receiving a request to define a term within the document, associating the user-provided definition of the term with the document, notifying the term includes the user-provided definition, receiving a request to view the user-provided definition, and displaying the definition to the remote user. | 10-08-2009 |
20090327373 | METHOD FOR PERFORMING MEMORY LEAK ANALYSIS INSIDE A VIRTUAL MACHINE - A method, system, computer program product, and computer program storage device for performing a memory leak analysis inside a virtual machine is disclosed. By utilizing thread stack(s), class statics, and/or a list of root objects, a DFS algorithm starts execution at root objects in the thread stack(s), class statics, and/or a list of root objects. Upon fully processing an object, a reachability (sum of sizes of all child objects plus a size of the object itself) of the object is calculated. When the reachability of the object is larger than a threshold and when all reachabilities of children of the objects are less than another threshold (i.e., a largest child reachability of the object is less than another threshold), the object is determined as a potential source of a memory leak. | 12-31-2009 |
20100179993 | EMAIL PRODUCTIVITY MONITORING FACILITY - A method is presented for monitoring electronic communications to facilitate productivity. The method may include detecting the opening of an electronic message on a computer and storing a start time corresponding to the opening. Metadata associated with the electronic message may be recorded. Such metadata may include, for example, a recipient, a sender, a subject, and a number of words typed. The method may further detect the closing of the electronic message, and may store an end time corresponding to the closing. Efficiency metrics associated with the message may be calculated based on the start time, the end time, and the metadata. Efficiency metrics may include, for example, total time spent, total word count, and number of words typed per minute. A report reflecting the metadata and the efficiency metrics may be generated. | 07-15-2010 |
20120144398 | DELAYED EXPANSION OF VALUES IN CONTEXT - Application context changes associated with instantiated applications are monitored at a context tracking device. In response to each application context change, relationship context dependency properties between the instantiated applications and application resources associated with the instantiated applications are evaluated. At least one relationship context dependency property that is used by at least one of the instantiated applications is determined to have changed as a result of an application context change. The at least one relationship context dependency property is updated during runtime based upon the application context change. | 06-07-2012 |
Peter Chacko, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130204849 | DISTRIBUTED VIRTUAL STORAGE CLOUD ARCHITECTURE AND A METHOD THEREOF - The present disclosure relates to a distributed information storage system which functions as virtual cloud storage overlay on top of physical cloud storage systems. The disclosure discloses transparently solving all the data management related security, virtualization, reliability and enables transparent cloud storage migration, cloud storage virtualization, information dispersal and integration across disparate cloud storage devices operated by different providers or on-premise storage. The cloud storage is owned or hosted by same or different third-party providers who own the information contained in the storage which eliminates cloud dependencies. This present disclosure functions as a distributed cloud storage delivery platform enabling various functionalities like cloud storage virtualization, cloud storage integration, cloud storage management and cloud level RAID. | 08-08-2013 |
Pribin Chacko, Kottayam IN
Patent application number | Description | Published |
---|---|---|
20140297670 | ENHANCED FLEXIBILITY FOR USERS TO TRANSFORM XML DATA TO A DESIRED FORMAT - An aspect of the present disclosure provides enhanced flexibility for users to transform XML data to a desired format. In an embodiment, a configuration data indicates the specific elements required for generating the output for other elements. During a first pass, any occurrences of the specific elements in an input XML data are populated in a cache. During a second pass, XSL transformation rules are used for transforming the elements of the XML data. When an XSL transformation requires a specific element stored in the cache, the specific element is retrieved and an output portion is formed by incorporating the retrieved element according to the XSL transformation rule. According to another aspect, the configuration data also specifies various context objects that are enabled to interface with corresponding external (data) sources. Accordingly, data from external sources is enabled to be incorporated in the output according to XSL transformation rules. | 10-02-2014 |
Sajan Chacko, Kochi IN
Patent application number | Description | Published |
---|---|---|
20150093088 | Fiber Optic Terminal Assemblies - A fiber optic terminal assembly comprises a mounting plate configured to be mounted to a surface, a pivot bracket comprising a handle, and a spool rotatably mounted to the pivot bracket and configured to store a multi-fiber optic cable. The spool comprises an adapter for securing a connection between a fiber of the multi-fiber optic cable and a fiber of an output fiber cable. The spool and the pivot bracket are configured to be selectively coupled to the mounting plate. A method of using the fiber optic terminal assembly comprises paying out a multi-fiber optic cable stored on the spool by rotating the spool relative to the pivot bracket. The method also comprises selectively coupling the spool and the pivot bracket to a mounting plate after paying out the multi-fiber optic cable. Selectively coupling the spool and the pivot bracket substantially prevents rotation of the spool. | 04-02-2015 |
Simy Chacko, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20140122867 | ENCRYPTION AND DECRYPTION OF USER DATA ACROSS TIERED SELF-ENCRYPTING STORAGE DEVICES - A method and system for automated encryption and decryption of user data across tiered self-encrypting storage devices is disclosed. A storage tier is created using self-encrypting devices. When a user logs on to an enterprise, the enterprise gateway authenticates the user with login credentials. A protocol packet is sent over the IP network to the storage tiering software. The protocol packet contains the user credentials, the storage devices that are mapped into user account. The storage tiering software identifies the list of mapped drives and maps them into devices and blocks. Further, the storage tiering software cascades all devices that contain user data. Selective decryption of the user data is then performed and is stored in a cache of each device and this data will be ready for user to use. The decrypted data from the cache will be erased when user logs off the enterprise. | 05-01-2014 |
20140215209 | ENTERPRISE DISTRIBUTED FREE SPACE FILE SYSTEM - A method and system for effective utilization of free space in electronic devices with a non-volatile memory, across an enterprise is disclosed. The enterprise distributed free space file system disclosed herein comprises a central server and multiple nodes with an agent in each node. The agent creates hidden blocks of configurable sizes in the free spaces of each electronic device and reports the availability of blocks to the central server. The central server encrypts the content to be stored in the blocks and generates an encryption key for each block. The encryption keys are randomly generated and stored in the database of the central server. The encrypted content is invisible to the owner of the electronic device. The encryption key is not shared with nodes or any other system. Further, the stored content in the free spaces can be accessed only through the central server. | 07-31-2014 |
20140283127 | Masking sensitive data in HTML while allowing data updates without modifying client and server - The principal object of this embodiment is to propose a method and system for masking sensitive data in web applications while allowing data updates without modifying client and server by intercepting the data live at HTTP/HTTPS network layer, improving the data security of data, providing authorized and restricted access for visibility of information to the users. | 09-18-2014 |
20150370689 | AUTOMATED DEFECT POSITIONING BASED ON HISTORICAL DATA - Disclosed herein are a method and a system for software defect positioning. The system collects at least one type of information with respect to the defect and analyzes the collected input to select a suitable mode of defect positioning procedure. The defect positioning procedures used by the system identify defect location/position based on history data. After identifying the location of the defect, the system communicates the identified defect location/position to a user using a suitable output interface. | 12-24-2015 |
20150378873 | AUTOMATICALLY RECOMMENDING TEST SUITE FROM HISTORICAL DATA BASED ON RANDOMIZED EVOLUTIONARY TECHNIQUES - Disclosed herein are a system and a method for automated test suite optimization and recommendation, based on historical data, using randomized evolutionary techniques. The system analyzes historical data pertaining to file change pattern and test case execution history to identify test cases that match application being tested. Further, based on the test cases identified, the system generates optimized test suite recommendations to the user. | 12-31-2015 |
20150378874 | Defect Classification And Association In A Software Development Environment - Defect classification and association in a software development environment. The embodiments herein relates to a software development environment, and more particularly to managing defects in a software development environment. The defect management engine may use information present in the code repository to create a master list of features and/or sub-features. Using the master list, the defect management engine may scan and parse all reported defects (which may be present in the defect repository The defect management engine may associate defects with features present in the master list. The defect management engine may then extract the test cases and map the test cases to the defects. The defect management engine may determine the test coverage metric and the test case sufficiency metric. The defect management engine may also label unmapped defects as orphan defects. | 12-31-2015 |
20150378985 | METHOD AND SYSTEM FOR PROVIDING SEMANTICS BASED TECHNICAL SUPPORT - A method and system for providing semantics based technical support. The embodiments herein relates to providing semantics based technical support, and more particularly to providing semantics based technical support based on available knowledge sources and similarity of technical support issues. Embodiments disclosed herein provide users with requisite information in real time while an issue is being reported. | 12-31-2015 |
V. C. Prakash Vk Chacko, Penang MY
Patent application number | Description | Published |
---|---|---|
20130136276 | METHOD AND APPARATUS FOR RECEIVING AND PLAYING A SIGNAL IN A RADIO RECEIVER - A method and apparatus for receiving and playing a signal in a radio receiver to suppress microphonic feedback are provided by alternately pitch shifting a received audio signal. The pitch of the received audio signal is alternately shifted up and then down, repeatedly over successive intervals of the audio signal, to produce a pitch swing signal which is then played over a speaker. The alternating pitch shifting prevents the buildup of regenerative feedback normally caused by acoustic vibrations coupling into the radio receiver. | 05-30-2013 |
Viju Chacko, Kochi IN
Patent application number | Description | Published |
---|---|---|
20160117322 | KNOWLEDGE REPRESENTATION IN A MULTI-LAYERED DATABASE - Knowledge representation in a multi-layered database includes systems and methods for storing and retrieving data in the multi-layered database. The multi-layered database includes an object database layer that stores objects corresponding to real world entities and each object is associated with object properties, object relationships, and relationship properties. Underlying the object database layer is a graph database layer that stores nodes, node properties associated with the nodes, edges, and edge properties associated with the edges, wherein the nodes correspond to objects, node properties are indicative of the object properties, the edges are indicative of the object relationships, and the edge properties are indicative of the relationship properties of the object. Further, underlying the graph database layer is a backend database layer that stores corresponding data and metadata. Data can be stored and retrieved from the multi-layered database by composing and decomposing information between layers. | 04-28-2016 |
20160117752 | RECOMMENDATION ENGINE - A method for providing recommendations for customers is described. The method comprises obtaining transaction data associated with one or more products being purchased by a customer. The method further comprises generating a customer household graph, wherein the customer household graph comprises a customer household node associated with the customer, a product superset node, and one or more product nodes associated with the product superset node. Further, at least one product metadata node associated with each of the one or more product nodes is determined. Further, at least one user node is associated with the customer household node based on the at least one product metadata node. Further, a user group node associated with the customer household node is determined based on the at least one user node. Further, one or more recommendations to be provided to the user are ascertained. | 04-28-2016 |
Vinoo M. Chacko, Thiruvananthapuram IN
Patent application number | Description | Published |
---|---|---|
20140293810 | METHOD FOR IDENTIFYING OPTIMAL INFLUENCIAL PATHS IN A DISTRIBUTED NETWORK FOR TRANSMITTING INFORMATION - The present disclosure is related to a method for identifying optimal influential paths in a distributed network for transmitting information/request to one or more target nodes. The routing server at the source node identifies one or more target nodes in the network based on information. Thereafter, routing server identifies one or more optimal nodes based on influence value associated with each node in network and determines predicted action that will be performed by the optimal node and transmits the information to each optimal node. Each optimal node performs an action upon receiving the information from the source node. The routing server receives the data related to the operation performed and updates influence value associated with respective nodes. The routing server identifies one or more optimal paths based on one of the influence value being updated and the action performed by each optimal node. | 10-02-2014 |
20140297887 | METHOD FOR TRANSMITTING INFORMATION ON PRIORITY BASIS TO ONE OR MORE NODES IN DISTRIBUTED NETWORK - The present disclosure is related to a method for transmitting information on priority basis to one or more nodes in distributed network. The routing server at source node generates one or more set of nodes from plurality of nodes based on reputation value. The routing server identifies first set of nodes with highest reputation value, determines predicted action to be perforrmed by each node. The routing server transmits information to each node in first set. Each node performs an action. The routing server computes the difference between the predicted action and action performed by each node in the first set and updates the reputation value of each node in the first set. Thereafter, routing server transmits the information the second set, third set and so on. | 10-02-2014 |