Kolli
Aasheesh Kolli, Ann Arbor IN
Patent application number | Description | Published |
---|---|---|
20140143522 | PREFETCHING BASED UPON RETURN ADDRESSES - An apparatus for processing data includes signature generation circuitry | 05-22-2014 |
Ashish Kolli, Redwood City, CA US
Patent application number | Description | Published |
---|---|---|
20090037446 | Lightweight Directory Access Protocol (LDAP) Schema Definition Using Extensible Markup Language (XML) - A computer receives a schema that lacks information required by a directory access protocol (e.g. LDAP) and automatically generates information that conforms to the directory access protocol and supplies the generated information as output in a new schema. Such automatic schema transformation allows a human who is creating the schema, to enable usage of the directory access protocol to interface with a directory implementing the schema, without knowing the directory access protocol. The computer of some embodiments receives the schema being input, in a predetermined human-readable language (e.g. XML). Hence, an XML developer who lacks knowledge of LDAP can use traditional XML tools to prepare an LDAP-incompatible schema, for use in implementing a directory (e.g. address book) that is accessed by an LDAP client (e.g. cell phone) via an LDAP server. The new schema can be output in any form (e.g. text/binary) and in any language. | 02-05-2009 |
Ashish Kolli, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20150089579 | WEB-BASED SINGLE SIGN-ON WITH FORM-FILL PROXY APPLICATION - Web-based single sign-on can enable a user to log in to a single interface (such as through a web browser or thin client) and then provide SSO services to the user for one or more web applications. The web-based SSO system can be extended to support one or more different access control methods, such as form-fill, Federated (OIF), SSO Protected (OAM), and other policies. The web-based SSO system can include a user interface through which the user can access different web applications, systems, etc. and manage their credentials. Each SSO service can be associated with a web interface allowing the SSO services to be accessed over the web. The web interfaces can provide CRUD (create, read, update, delete) functionality for each SSO service. To support different access policy types, the web-based SSO system can include an extensible data manager that can manage data access to different types of repositories transparently. | 03-26-2015 |
20150089580 | WEB-BASED SINGLE SIGN-ON LOGON MANAGER - Web-based single sign-on can enable a user to log in to a single interface (such as through a web browser or thin client) and then provide SSO services to the user for one or more web applications. The web-based SSO system can be extended to support one or more different access control methods, such as form-fill, Federated (OIF), SSO Protected (OAM), and other policies. The web-based SSO system can include a user interface through which the user can access different web applications, systems, etc. and manage their credentials. Each SSO service can be associated with a web interface allowing the SSO services to be accessed over the web. The web interfaces can provide CRUD (create, read, update, delete) functionality for each SSO service. To support different access policy types, the web-based SSO system can include an extensible data manager that can manage data access to different types of repositories transparently. | 03-26-2015 |
20150089619 | WEB-BASED INTERFACE INTEGRATION FOR SINGLE SIGN-ON - Web-based single sign-on can enable a user to log in to a single interface (such as through a web browser or thin client) and then provide SSO services to the user for one or more web applications. The web-based SSO system can be extended to support one or more different access control methods, such as form-fill, Federated (OIF), SSO Protected (OAM), and other policies. The web-based SSO system can include a user interface through which the user can access different web applications, systems, etc. and manage their credentials. Each SSO service can be associated with a web interface allowing the SSO services to be accessed over the web. The web interfaces can provide CRUD (create, read, update, delete) functionality for each SSO service. To support different access policy types, the web-based SSO system can include an extensible data manager that can manage data access to different types of repositories transparently. | 03-26-2015 |
20150089620 | VIRTUALIZED DATA STORAGE AND MANAGEMENT OF POLICY AND CREDENTIAL DATA SOURCES - Web-based single sign-on can enable a user to log in to a single interface (such as through a web browser or thin client) and then provide SSO services to the user for one or more web applications. The web-based SSO system can be extended to support one or more different access control methods, such as form-fill, Federated (OIF), SSO Protected (OAM), and other policies. The web-based SSO system can include a user interface through which the user can access different web applications, systems, etc. and manage their credentials. Each SSO service can be associated with a web interface allowing the SSO services to be accessed over the web. The web interfaces can provide CRUD (create, read, update, delete) functionality for each SSO service. To support different access policy types, the web-based SSO system can include an extensible data manager that can manage data access to different types of repositories transparently. | 03-26-2015 |
Ganesh Kolli, Hyderabad Ap IN
Patent application number | Description | Published |
---|---|---|
20130290265 | Backup jobs scheduling optimization - Scheduling of backup jobs is optimized in accordance with a characteristic of the backup jobs. The characteristic of the backup jobs can take into account a number of the backup jobs that are stale. A stale backup job is a backup job in which no backed up data changed during a most recent performance of the backup job. | 10-31-2013 |
20140052694 | DATA BACKUP PRIORITIZATION - A method for prioritizing data backup requests includes assigning priority values to a plurality of parameters, each parameter being associated with a plurality of data backup requests. The data backup requests can be sorted according to a primary parameter based on the priority values to prioritize the data backup requests. The data backup requests can also be sorted according to a secondary parameter when at least two of the data backup requests have a same primary parameter priority value. | 02-20-2014 |
Ganesh Kolli, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150370645 | SELECTING A BACKUP TYPE BASED ON CHANGED DATA - Techniques for selecting a backup type based on changed data are described in various implementations. An example method that implements the techniques may include identifying a backup policy that describes a source of data to be backed up during a backup operation. The method may also include determining an amount of data that has changed on the source since a previous backup of the source. The method may also include selecting a type of backup to perform based on the amount of data that has changed on the source. The method may also include causing the backup operation to be performed using the selected type of backup. | 12-24-2015 |
Ganesh Kolli, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20160132262 | DATA BACKUP PRIORITIZATION - A method for prioritizing data backup requests includes assigning priority values to a plurality of parameters, each parameter being associated with a plurality of data backup requests. The data backup requests can be sorted according to a primary parameter based on the priority values to prioritize the data backup requests. The data backup requests can also be sorted according to a secondary parameter when at least two of the data backup requests have a same primary parameter priority value. | 05-12-2016 |
Gopi K. Kolli, Concord, MA US
Patent application number | Description | Published |
---|---|---|
20090265408 | METHODS AND APPARATUS FOR PERFORMING CALCULATIONS USING REDUCED-WIDTH DATA - Methods, apparatus, and articles of manufacture for performing calculations using reduced-width data are disclosed. In particular, an example method determines reduced-width data values associated with generating and evaluating functions. Some of the reduced-width data values are stored within instructions in an instruction memory during a compile phase and retrieved from instruction memory during a runtime phase. | 10-22-2009 |
Kiran Kumar Kolli, Guntur IN
Patent application number | Description | Published |
---|---|---|
20130097198 | BUSINESS ACTIVITY MONITORING RUNTIME - Systems and methods for monitoring business applications are disclosed. Data is provided from an application programming interface (API) in a monitored application to a collection runtime. The collection runtime collects data based upon a data collection model. A current time increment is assigned to the collected data. The collected data is provided as a stream of event data to an event processing service, which performs one or more queries on the data stream. The results of the queries are provided to a data store and/or to a user interface. The data collection model is created from a data collection profile, and the queries are created from an observation model. | 04-18-2013 |
Madhuri Kolli, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20110206059 | METHODS AND DEVICES FOR TRANSMITTING DATA BETWEEN STORAGE AREA NETWORKS - Methods and devices are provided for efficient transmission of data between storage area networks. According to some aspects of the invention, novel methods are provided for processing data packets sent by, or received from, a storage area network. Some such aspects of the invention involve storing a packet (or a portion of a packet) in a single memory location during an encapsulation or de-encapsulation process. Instead of repeatedly copying the packet during processing, pointer information is passed along that indicates the single memory location. In some aspects of the invention, the segment boundaries of a packet are retained after data transmission. If data in the packet need to be re-transmitted, the packet is re-transmitted with the same segment boundaries. | 08-25-2011 |
Naveen Kolli, Newbury Park, CA US
Patent application number | Description | Published |
---|---|---|
20110063483 | Image sensor with wide dynamic range - An image sensor, system and method that alternates sub-sets of pixels with long exposure times and pixels with short exposure times on the same sensor to provide a sensor having improved Wide Dynamic Range (WDR). The sub-sets of pixels are reset at different time intervals after being read, which causes the respective integration times to vary. By combining information contained in the both the short and long integration pixels, the dynamic range of the sensor is improved. | 03-17-2011 |
Naveen Kolli, Thousand Oaks, CA US
Patent application number | Description | Published |
---|---|---|
20140192236 | DYNAMIC, LOCAL EDGE PRESERVING DEFECT PIXEL CORRECTION FOR IMAGE SENSORS - Various technologies described herein pertain to defect pixel correction for image data collected by a pixel array of an image sensor. Neighborhood statistics for a given pixel from the image data are computed based on values of neighbor pixels of the given pixel from the image data. Whether the value of the given pixel is defective is detected based on the neighborhood statistics. The value of the given pixel is replaced when detected to be defective to output modified image data. Correction of the given pixel is a function of whether the given pixel is in a flat region or a non-flat region. When the given pixel is defective and in a non-flat region, a minimum edge across the given pixel is identified and the value of the given pixel is replaced with an average of values of neighbor pixels that belong to the minimum edge. | 07-10-2014 |
20140211048 | DYNAMIC, LOCAL EDGE PRESERVING DEFECT PIXEL CORRECTION FOR IMAGE SENSORS WITH SPATIALLY ARRANGED EXPOSURES - Various technologies described herein pertain to defect pixel correction for image data collected by a pixel array of an image sensor with spatially arranged exposures. The pixel array includes a first subset of pixels having a first exposure time and a second subset of pixels having a second exposure time. An exposure ratio (ratio of first exposure time to second exposure time) is received. A value of at least a particular neighbor pixel of a given pixel from the image data is adjusted based upon the exposure ratio. Neighborhood statistics for the given pixel from the image data are computed based on values of neighbor pixels of the given pixel from the image data as adjusted. Whether the value of the given pixel is defective is detected based on the neighborhood statistics. The value of the given pixel is replaced when detected to be defective to output modified image data. | 07-31-2014 |
20150029364 | DYNAMIC, LOCAL EDGE PRESERVING DEFECT PIXEL CORRECTION FOR IMAGE SENSORS - Various technologies described herein pertain to defect pixel correction for image data collected by a pixel array of an image sensor. Neighborhood statistics for a given pixel from the image data are computed based on values of neighbor pixels of the given pixel from the image data. Whether the value of the given pixel is defective is detected based on the neighborhood statistics. The value of the given pixel is replaced when detected to be defective to output modified image data. Correction of the given pixel is a function of whether the given pixel is in a flat region or a non-flat region. When the given pixel is defective and in a non-flat region, a minimum edge across the given pixel is identified and the value of the given pixel is replaced with an average of values of neighbor pixels that belong to the minimum edge. | 01-29-2015 |
Raja Kolli, Irvine, CA US
Patent application number | Description | Published |
---|---|---|
20080212598 | System and Method for Transparent Virtual Routing - A transparent routing device disposed within an access network configured in accordance with one or more lower-layer protocols is disclosed herein. The device includes a set of subscriber-side ports. Each of the subscriber-side ports is associated with a plurality of virtual subscriber-side interfaces disposed to effectively terminate a corresponding plurality of subscriber-side connections with subscriber host devices served by the access network. The device further includes at least one network-side port through which communication occurs with an external network in accordance with a higher-layer protocol. A routing table is configured to establish a correspondence between network addresses of the subscriber host devices and the plurality of virtual subscriber-side interfaces. During operation of the device, packets received through the at least one network-side port are forwarded to corresponding ones of the virtual subscriber-side interfaces based upon network addresses of the packets. | 09-04-2008 |
Satyadev Kolli, Milpitas, CA US
Patent application number | Description | Published |
---|---|---|
20100211765 | CLOCK AND POWER FAULT DETECTION FOR MEMORY MODULES - A system, method and apparatus for clock and power fault detection for a memory module is provided. In one embodiment, a system is provided. The system includes a voltage detection circuit and a clock detection circuit. The system further includes a controller coupled to the voltage detection circuit and the clock detection circuit. The system also includes a memory control state machine coupled to the controller. The system includes volatile memory coupled to the memory control state machine. The system further includes a battery and battery regulation circuitry coupled to the controller and the memory control state machine. The battery, battery regulation circuitry, volatile memory, memory control state machine, controller, clock detection circuit and voltage detection circuit are all collectively included in a unitary memory module. | 08-19-2010 |
20100238754 | CLOCK AND POWER FAULT DETECTION FOR MEMORY MODULES - A system, method and apparatus for clock and power fault detection for a memory module is provided. In one embodiment, a system is provided. The system includes a voltage detection circuit and a clock detection circuit. The system further includes a controller coupled to the voltage detection circuit and the clock detection circuit. The system also includes a memory control state machine coupled to the controller. The system includes volatile memory coupled to the memory control state machine. The system further includes a battery and battery regulation circuitry coupled to the controller and the memory control state machine. The battery, battery regulation circuitry, volatile memory, memory control state machine, controller, clock detection circuit and voltage detection circuit are all collectively included in a unitary memory module. | 09-23-2010 |
20110125966 | MULTI-RANK MEMORY MODULE THAT EMULATES A MEMORY MODULE HAVING A DIFFERENT NUMBER OF RANKS - A transparent four rank memory module has a front side and a back side. The front side has a third memory rank stacked on a first memory rank. The back side has a fourth memory rank stacked on a second memory rank. An emulator coupled to the memory module activates and controls one individual memory rank from either the first memory rank, the second memory rank, the third memory rank, or the fourth memory rank based on the signals received from a memory controller. | 05-26-2011 |
20130036264 | MULTI-RANK MEMORY MODULE THAT EMULATES A MEMORY MODULE HAVING A DIFFERENT NUMBER OF RANKS - A transparent four rank memory module has a front side and a back side. The front side has a third memory rank stacked on a first memory rank. The back side has a fourth memory rank stacked on a second memory rank. An emulator coupled to the memory module activates and controls one individual memory rank from either the first memory rank, the second memory rank, the third memory rank, or the fourth memory rank based on the signals received from a memory controller. | 02-07-2013 |
Sivakumar Kolli, Walnut Creek, CA US
Patent application number | Description | Published |
---|---|---|
20130210383 | VARIABLE BILLING OF MMS MESSAGES IN WIRELESS NETWORK COMMUNICATION SYSTEM BASED ON MESSAGE FORMATION APPLICATION - A wireless mobile communication device may include a transmitter configured to wirelessly transmit MMS messages over a wireless network communication system. The device may also include a plurality of user applications. Each user application may be of a different type and configured to generate content for an MMS message based on input to the wireless mobile communication device. The mobile communication device may include an MMS client configured to generate MMS messages based on content supplied by the user applications. The MMS client may be configured to generate a value for a field of information within each MMS message that is indicative of the type of user application which supplies content for the MMS message. The value may be different for each different type of user application. | 08-15-2013 |
Sowjanya Kolli, Novi, MI US
Patent application number | Description | Published |
---|---|---|
20140191911 | Antenna Assembly - A vehicle component having a housing made of non-metallic material and having at least one surface made of metallic material is provided, and an antenna assembly is disposed in the vehicle component. The antenna assembly includes a high-gain film-type antenna element having an input for receiving a wireless signal, an output, and a ground portion is disposed on said non-metallic portion of the housing of said vehicle component. The antenna assembly also includes a low noise amplifier (LNA) and a feeding structure including a coaxial cable and a ground wire. The coaxial cable establishes electrical communication between the antenna element and the LNA, and the ground wire establishes an electrical connection between the ground portion of the antenna element and the metallic surface of the vehicle component. | 07-10-2014 |
Sujana Kolli, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20130035973 | ASSESSING GREEN IT MATURITY AND PROVIDING GREEN IT RECOMMENDATIONS - A Green IT maturity model (GITM) provides a framework in which the maturity of an organization's green computing effort can be assessed. Based on green computing practice data, an assessment tool implementing a GITM model can be used to calculate the competency levels of multiple green computing pillars such as data center, end user computing, IT asset lifecycle, IT service management and people practices pillars. The determined competency levels can be used to determine a consolidated Green IT maturity level for the organization. A Green IT baseline of an organization can be determined and carbon emission reductions relative to the baseline can be used in determining the competency levels. The assessment tool can use the competency and maturity levels to recommend green computing initiatives and to estimate cost savings, implementation costs and carbon emission reductions for the recommended initiatives. | 02-07-2013 |
Vijay Kolli, Schaumburg, IL US
Patent application number | Description | Published |
---|---|---|
20120010929 | METHOD AND SYSTEM FOR MARKETING - A method for marketing and system for marketing are disclosed. In one embodiment, a method for marketing a product includes identifying the product at a mobile device associated with a user, and generating a message indicative of an endorsement of the product by the user, the generating being performed at least in part by way of the mobile device. The method further includes causing, by way of the mobile device, a sending of the message to at least one receiving device associated with at least one personal social contact of the user. Due to the causing, a seller of the product is also notified that the sending of the message has occurred. | 01-12-2012 |