Nataraj, Bangalore
Nandini Nataraj, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120231520 | NOVEL FUSION PROTEINS AND METHOD OF EXPRESSION THEREOF - The present invention relates to novel Prolipase-Bovine trypsinogen (PLBTR) fusion proteins, the genes encoding them, and the production and uses thereof. More specifically, the present invention relates to methods of producing in optimal quantities PLBTR fusion proteins which comprise a heterologous polypeptide which is normally susceptible to autocatalytic activity. More particularly, the present invention relates to fusion proteins which comprise an heterologous polypeptide, such as a serine protease, fused to a lipase signal sequence, which can be expressed by recombinant host cells in desired amounts. The present invention further relates to polynucleotides encoding such fusion proteins, to expression vectors for expression of such fusion proteins, to host cells transformed with such polynucleotides/vectors, and to methods of generating such fusion proteins. | 09-13-2012 |
Nitin Nataraj, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140282351 | FLEXIBLE AND SCALABLE SOFTWARE SYSTEM ARCHITECTURE FOR IMPLEMENTING MULTIMEDIA APPLICATIONS - A flexible and scalable software system architecture for implementing multimedia applications is disclosed. In one embodiment, the flexible and scalable software system architecture includes a platform abstraction layer (PAL), a device policy manager (DPM), a media engine, a library of commons (LoC) module, system management toolsets (SMT), one or more application services, an application control unit (ACU) and a user interface transaction layer (UITL). Further, the media engine is communicatively coupled between the PAL and the ACU, the LoC module is communicatively coupled to the ACU, the DPM, the media engine, the SMT, the PAL and the UITL, the DPM is communicatively coupled to the PAL, the ACU and the media engine, the ACU is coupled between media engine and the UITL, and the SMT is communicatively coupled to the ACU, the DPM, the media engine, the LoC module, the PAL and the UITL. | 09-18-2014 |
Pruthvi P. Nataraj, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150278129 | INTER-ADAPTER COOPERATION FOR MULTIPATH INPUT/OUTPUT SYSTEMS - Dynamically sharing information among a plurality of adapters in a multipath input/output (MPIO) system, selecting one of the adapters to receive an input/output request based on the shared information, and sending the input/output request to that adapter. | 10-01-2015 |
Pruthvi Panyam Nataraj, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20080276301 | Method and System for Software Installation - A network based installation management system that dynamically manages secure software installation on a client. The server is configured to determine the software required and prepare an appropriated response containing the list of software and an information file containing the respective attributes of the list of software. The server encoded this response and the encoded response is transmitted to the client. The client on receiving the response is configured to authenticate the response and install the encoded response after authentication. Highly accurate and reliable software installation using the network based installation management system may be achieved using a respective hardware element on the client and the server, which is configured to encode and decode a request and/or response suitably thereby providing a high level of security and trust in an un-trusted network environment. | 11-06-2008 |
20090210647 | METHOD FOR DYNAMICALLY RESIZING FILE SYSTEMS | 08-20-2009 |
20090210648 | SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DYNAMICALLY RESIZING FILE SYSTEMS | 08-20-2009 |
20120124108 | SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DYNAMICALLY RESIZING FILE SYSTEMS | 05-17-2012 |
20120185510 | DOMAIN BASED ISOLATION OF OBJECTS - Functionality can be implemented in an operating system to increase the granularity of isolation for objects. A domain can be defined to represent each of different entities (e.g., different departments or work groups). User identifiers and/or user credentials can be associated with the appropriate domain or domains. An administrator can then define a set of rules that govern operation(s) that can be performed on the objects based on the domains. Processes running on a system will inherit the domains of a user account logged into the system. When a process running on the system attempts to perform an operation on an object, an operating system process evaluates the domain isolation rules with an identifier of the object and a domain identifier to determine whether the operation is permitted to proceed. | 07-19-2012 |
20120185581 | DOMAIN BASED ISOLATION OF NETWORK PORTS - When an operating system process evaluates a rule for an operation being attempted on a logical network port, the operating system process determines whether the target logical port falls within a range of logical ports, and then determines whether the operation is associated with a permitted domain of the range of logical ports. If the operation is a bind operation, then the process attempting to bind to the target port will be allowed to bind if the target port falls within the range and the operation/process is associated with a permitted domain. Otherwise, the binding operation will not be allowed to proceed. | 07-19-2012 |
20120185661 | DOMAIN BASED ACCESS CONTROL OF PHYSICAL MEMORY SPACE - Domains can also be used to control access to physical memory space. Data in a physical memory space that has been used by a process sometimes endures after the process stops using the physical memory space (e.g., the process terminates). In addition, a virtual memory manager may allow processes of different applications to access a same memory space. To prevent exposure of sensitive/confidential data, physical memory spaces can be designated for a specific domain or domains when the physical memory spaces are allocated. | 07-19-2012 |
Pruthvi Panyan Nataraj, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120185930 | DOMAINS BASED SECURITY FOR CLUSTERS - Domains can be used to secure resources of a cluster. An administrator can configure a node of a cluster as a member of a particular domain. Membership in a cluster can be restricted to nodes that are members of the particular domain. When a node generates a cluster message, a kernel process or operating system process of the node will indicate the domain(s) of the node in the cluster message. The cluster message can be a command message to read or write to a storage resource of the cluster. When the cluster storage resource node or node that controls the storage resource receives the command message, the node will examine the command message to ensure the message indicates a domain that aligns with the cluster. If the proper domain is indicated in the command message, then the command message is processed. Otherwise, the command message is denied. | 07-19-2012 |