-
公开(公告)号:US20190166130A1
公开(公告)日:2019-05-30
申请号:US16243902
申请日:2019-01-09
Applicant: International Business Machines Corporation
Inventor: Nataraj Nagaratnam , Pamela A. Nesbitt , Sandeep R. Patil , Sachin C. Punadikar
Abstract: An approach is provided that registers a wearable device in response to receiving a registration request that includes a set of acceptable user states and a corresponding set of acceptable times to perform a set of actions. When the approach receives a request from the user of the network-accessible site to perform a selected one of the set of actions, the approach transmits an inquiry to the wearable device registered to the user. Then, the approach receives a current state of the user from the wearable device responding to the transmitted state inquiry and determines a current time. In turn, the approach performs the selected action at the network-accessible site in response to determining that the received current state of the user matches one of the set of acceptable states and the current time matches one of the set of acceptable times.
-
公开(公告)号:US10298266B2
公开(公告)日:2019-05-21
申请号:US15183045
申请日:2016-06-15
Applicant: International Business Machines Corporation
Inventor: Pradipta K. Banerjee , Sasikanth Eda , Sandeep R. Patil , Subhojit Roy
Abstract: Embodiments of the present invention provide methods, systems, and computer program products for using a storlet erasure code object storage architecture for image processing. In one embodiment, an object is received, the object being represented as erasure coded bits. A storage location associated with the erasure coded bits is identified. A virtual machine (VM) is invoked, where the VM is configured to compute a modification to the erasure coded bits and replace the original erasure coded bits with the modified erasure coded bits.
-
公开(公告)号:US10261565B2
公开(公告)日:2019-04-16
申请号:US15060153
申请日:2016-03-03
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Blaine H. Dolph , Miku K. Jha , Sandeep R. Patil , Gandhi Sivakumar , Riyazahamad M. Shiraguppi
IPC: G06F1/32 , G06F21/74 , G06F9/44 , G06F21/57 , G06F1/3212 , G06F1/3234 , G06F9/4401
Abstract: An approach is provided for operating a mobile device having first and second operating systems (OSs) installed. While the mobile device is executing the first OS but not the second OS, (1) based in part on battery power remaining in the mobile device being less than a threshold and a lower power consumption of the mobile device if executing the second OS but not the first OS, execution of the first OS is terminated and the second OS is executed in the mobile device; and/or (2) based in part on (a) the mobile device being currently located in the first geographic region which has a greater likelihood of attack on the mobile device, and (b) the mobile device being more secure while operating the second OS but not the first OS, execution of the first OS is terminated and the second OS is executed in the mobile device.
-
24.
公开(公告)号:US10210191B2
公开(公告)日:2019-02-19
申请号:US14220921
申请日:2014-03-20
Applicant: International Business Machines Corporation
Inventor: Duane M. Baldwin , John T. Olson , Sachin C. Punadikar , Sandeep R. Patil
IPC: G06F17/30
Abstract: In one embodiment, a method for creating an object includes creating an object in an object store making use of a file system, obtaining an index node (inode) identifier (ID) for an inode associated with the object, creating an object ID for the object, wherein the object ID is unique from any other object IDs in the object store, merging the object ID with the inode ID, and modifying the inode to include at least the object ID. In another embodiment, a system includes a processor and logic integrated with and/or executable by the processor, the logic being configured to: create an object in an object store making use of a file system, obtain an inode ID for an inode associated with the object, create an object ID for the object, the object ID including the inode and modify the inode to include at least the object ID.
-
公开(公告)号:US20190004712A1
公开(公告)日:2019-01-03
申请号:US16125655
申请日:2018-09-07
Applicant: International Business Machines Corporation
Inventor: Bhooshan P. Kelkar , Sandeep R. Patil , Riyazahamad M. Shiraguppi , Prashant Sodhiya
CPC classification number: G06F3/0613 , G06F3/0611 , G06F3/0616 , G06F3/0634 , G06F3/0647 , G06F3/0659 , G06F3/0685 , G06F3/0688 , G06F12/16 , G06F2003/0692
Abstract: The present invention relates to a method, system, and computer program product for determining storage device weight values to use to select one of the storage devices to use as a target storage to which data from a source storage is migrated. A determination is made, for each of the storage devices, of static parameter values for static parameters comprising attributes of the storage device and dynamic parameter values for dynamic parameters providing device health information determined by accessing the storage device to determine operational conditions at the storage device. Storage device weight values are determined as a function of the static parameter values and the dynamic parameter values of the device. The determined storage device weight values are used to select one of the storage devices as the target storage to which data from the source storage is migrated.
-
26.
公开(公告)号:US10169167B2
公开(公告)日:2019-01-01
申请号:US15268707
申请日:2016-09-19
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Deepak R. Ghuge , Ashish Pandey , Sandeep R. Patil
Abstract: The first computer receives a signal that a second computer is back online after being offline, wherein the second computer was offline because of a failure. The first computer takes a first snapshot of the storage, wherein data that has a higher access frequency is stored on a first drive and data that has a lower access frequency is stored on a second drive. The first computer determines a snapshot difference between the first snapshot and a second snapshot. The first computer transmits the snapshot difference to the second computer, and transmits the data stored on the first drive to the second computer. The first computer promotes the data stored on the second drive to be considered equivalent to data stored drive and transmits the promoted data stored on the second drive to the second computer at the same transmission rate as the data stored on the first drive.
-
公开(公告)号:US20180300346A1
公开(公告)日:2018-10-18
申请号:US15486519
申请日:2017-04-13
Applicant: International Business Machines Corporation
Inventor: Sasikanth Eda , Sandeep R. Patil , Sachin C. Punadikar , Sanjay K. Sudam
IPC: G06F17/30
Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a snapshot utility for generating a snapshot of an erasure coded object in an object storage environment. Responsive to receiving a request to generate a snapshot of an erasure coded (EC) object in a filesystem in the object storage environment, the snapshot utility obtains a list of EC fragments from a proxy layer of the object storage environment. The snapshot utility copies a number of the EC fragments to generate the snapshot of the EC object.
-
公开(公告)号:US10089146B2
公开(公告)日:2018-10-02
申请号:US15087533
申请日:2016-03-31
Applicant: International Business Machines Corporation
Inventor: Brijesh Chougule , Sasikanth Eda , Deepak R. Ghuge , Sandeep R. Patil , Sanjay K. Sudam
IPC: G06F9/46 , G06F9/455 , G06F15/173 , G06F9/50 , G06F9/48
Abstract: A first storlet engine is monitored for a first computational algorithm. The storlet engine includes a lookup table including a first characteristic of one or more nodes, a parser unit, and a resource availability monitor. The first computational algorithm is parsed into an abstract syntax tree using a parser unit. A first category of the first computational algorithm is determined by analyzing the abstract syntax tree. A first node of the lookup table with the first characteristic matching the first category for processing the first computational algorithm is identified based on the first category of the computational algorithm. The first computational algorithm is sent to the first node for processing.
-
公开(公告)号:US20180081719A1
公开(公告)日:2018-03-22
申请号:US15270391
申请日:2016-09-20
Applicant: International Business Machines Corporation
Inventor: Duane M. Baldwin , Sasikanth Eda , John T. Olson , Sandeep R. Patil
Abstract: A present invention embodiment manages resources of a distributed system to perform computational tasks within a specified time interval. A received object is classified into a type of computational processing, and a quantity of objects is maintained for each type. An execution time for processing a single object is estimated based on a corresponding computation resource template. A total execution time for the quantity of objects of a type of computational processing is determined based on the estimated execution time. In response to the total execution time exceeding a user-specified time interval, an amount of resources of the distributed system is determined to process the quantity of objects of the type within the user-specified time interval. Nodes of the distributed system with objects classified in the type use the determined amount of resources to process the quantity of objects for the type within the user-specified time interval.
-
公开(公告)号:US09922181B2
公开(公告)日:2018-03-20
申请号:US15630248
申请日:2017-06-22
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Bhushan P. Jain , Sandeep R. Patil , Sri Ramanathan , Gandhi Sivakumar , Matthew B. Trevathan , Wijayaratnam Wijayakumaran
CPC classification number: G06F21/31
Abstract: Systems and methods for providing information security in a network environment are disclosed. The method includes initiating processing, invoked by a user, of at least one of a plurality of objects in a processing unit of a hardware layer, wherein the plurality of objects is hosted for a tenant. The method further includes determining that the processing of the at least one of the plurality of objects by the processing unit is authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes allowing the processing of the object based on a result of the determining.
-
-
-
-
-
-
-
-
-