-
公开(公告)号:US12293393B2
公开(公告)日:2025-05-06
申请号:US17664718
申请日:2022-05-24
Applicant: International Business Machines Corporation
Inventor: Asmahan Ali , Mustafa Mah , Abhishek Jain , Sasikanth Eda
IPC: G06Q30/0601
Abstract: Provided is a computer-implemented method, system, and computer program product for predictive service orchestration using threat modeling analytics. A processor may identify a plurality of attributes of a client computing environment. The processor may collect threat modeling content for a plurality of vendor computing environments. The processor may analyze the threat modeling content for the plurality of vendor computing environments. The processor may compare the analyzed threat modeling content for the plurality of vendor computing environments with the plurality of attributes of the client computing environment. The processor may generate, based on the comparing, a client threat model for the client computing environment.
-
公开(公告)号:US12210904B2
公开(公告)日:2025-01-28
申请号:US16023091
申请日:2018-06-29
Applicant: International Business Machines Corporation
Inventor: Sasikanth Eda , Sandeep R. Patil , William W. Owen , Kumaran Rajaram
Abstract: A method for more efficiently storing genomic includes designating multiple different data storage techniques for storing genomic data generated by a genomic pipeline. The method further identifies a file, made up of multiple blocks, generated by the genomic pipeline. The method determines which data storage technique is most optimal to store each block of the file. In doing so, the method may consider the type of the file, the stage of the genomic pipeline that generated the file, the access frequency for blocks of the file, the most accessed blocks of the file, and the like. The method stores each block using the data storage technique determined to be most optimal after completion of a designated stage of the genomic pipeline, such that blocks of the file are stored using several different data storage techniques. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US20240273001A1
公开(公告)日:2024-08-15
申请号:US18168744
申请日:2023-02-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Sasikanth Eda , Abhishek Jain , Deepak R. Ghuge
CPC classification number: G06F11/3089 , G06F11/1461 , G06F2201/805
Abstract: Described are techniques for determining a quiesce timeout for a containerized workload used to identify a storage unit for the containerized workload. The techniques include determining an Input/Output (I/O) rate associated with a containerized workload that executes in a container environment, where the containerized workload interfaces with a storage system to store the data. The techniques further include determining a quiesce timeout for the containerized workload that is based at least in part on the I/O rate of data associated with the containerized workload and an amount of memory allocated for buffering the data during performance of a backup operation without incurring an I/O overflow. The techniques further include determining storage unit specifications that enable performance of the backup operation within the quiesce timeout and evaluating storage units available to the container environment to identify a storage unit for the containerized workload based on the storage unit specifications.
-
公开(公告)号:US12019867B2
公开(公告)日:2024-06-25
申请号:US17028267
申请日:2020-09-22
Applicant: International Business Machines Corporation
Inventor: Sandeep Ramesh Patil , Pushkaraj Balasaheb Thorat , Sasikanth Eda , Abhishek Jain
CPC classification number: G06F3/0604 , G06F3/0647 , G06F3/067
Abstract: A method for assigning and migrating files among tiers within a unified storage environment. The method includes one or more computer processors determining a plurality of files stored within a tiered storage environment that are accessed by a set executing applications. The method further includes determining that one or more files of the plurality of files are accessed utilizing two or more protocols. The method further includes identifying a group of two or more tiering policies utilized within a tiered storage environment. The method further includes determining protocol-based heat count values corresponding the plurality of files. The method further includes storing the plurality of files among tiers of the tiered storage environment based on the identified group of two or more tiering polices and the protocol-based heat count values corresponding to the plurality of files.
-
公开(公告)号:US20230300193A1
公开(公告)日:2023-09-21
申请号:US17655018
申请日:2022-03-16
Applicant: International Business Machines Corporation
Inventor: Krishnasuri Narayanam , Phani Kumar V. U. Ayyagari , Rahul Rahul , Subhojit Roy , Sasikanth Eda
IPC: H04L67/1097 , H04L67/1008 , H04L67/1014 , H04L67/561
CPC classification number: H04L67/1097 , H04L67/1008 , H04L67/1014 , H04L67/2804
Abstract: Disclosed are techniques for programmatically mapping workloads for storage in different classes of a networked computer data storage environment, using a set of rules or data storage hints and properties of the workloads themselves. With the set of data storage hints, metadata sets are assigned to files of the incoming workloads to the networked computer data storage environment based on the properties of the workloads. Then, a target storage class is determined for each file of the workload from the plurality of storage classes present in the networked computer data storage environment. The workload files are then mapped to a logical bucket that is associated with the plurality of storage classes through a shared namespace, with the assigned metadata set for a file cueing the filesystem modules as to which storage class within the logical bucket to direct the various files of the workload to.
-
公开(公告)号:US11676599B2
公开(公告)日:2023-06-13
申请号:US17315397
申请日:2021-05-10
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Sasikanth Eda , Sarbajit K. Rakshit , Sandeep Ramesh Patil
CPC classification number: G10L15/22 , G10L25/78 , G10L2015/223
Abstract: A method for managing commands utilizing command boundaries includes establishing a first command boundary for a first intelligent virtual assistant operating on a first electronic device. The method also includes, responsive to receiving audio from a plurality of sources within a vicinity of the first electronic device, identifying a portion of the audio from the plurality of sources within the first command boundary. The method also includes, responsive to determining a command is identifiable in the portion of the audio from the plurality of sources within the first command boundary, sending the command to the first intelligent virtual assistant on the first electronic device.
-
公开(公告)号:US11650975B2
公开(公告)日:2023-05-16
申请号:US17119009
申请日:2020-12-11
Applicant: International Business Machines Corporation
Inventor: Asmahan Ali , Christina Lara , Abhishek Jain , Sasikanth Eda
IPC: G06F16/23 , G06F16/182
CPC classification number: G06F16/2365 , G06F16/182
Abstract: Online file system consistency check for container data on a clustered file system is provided via identifying inodes (index nodes) of a group of files in a clustered file system based on a cyber-resiliency for the clustered file system; grouping the inodes based on a buffer size allocated to a FSCK (File System Consistency Check) operation; passing the inodes of to the FSCK operation in a single iteration when a total size of the inodes is less than the buffer size; or when the total size of the inodes is greater than the buffer size, identifying inodes that belong to a first container and that belong to a second container; passing the inodes that belong to the first container to the FSCK operation in a first iteration; and passing, after the first iteration completes, the inodes that belong to the second container to the FSCK operation in a second iteration.
-
公开(公告)号:US20220391135A1
公开(公告)日:2022-12-08
申请号:US17338507
申请日:2021-06-03
Applicant: International Business Machines Corporation
Inventor: Ravindra R. Sure , Samrat P. Kannikar , Sukumar Vankadhara , Sasikanth Eda
IPC: G06F3/06
Abstract: A computational device configures a storage system that supports a plurality of submission queues. A file system of the computational device monitors characteristics of writes received from an application to distribute the writes among the plurality of submission queues of the storage system.
-
公开(公告)号:US11520664B2
公开(公告)日:2022-12-06
申请号:US16920918
申请日:2020-07-06
Applicant: International Business Machines Corporation
Inventor: Ashish Pandey , Venkateswara Rao Puvvada , Abhishek Jain , Sasikanth Eda
Abstract: A plurality of computing nodes is monitored for updates to one or more files located on the plurality. Based on the monitoring, a first file operation is detected that is related to a first file located on a first node. The first file is related to a first copy that is located on a second node. Based on the first file operation, it is determined that the first file operation is a copy operation of the first file to a second file located on the first node. A copy command related to the first file is transferred, in response to the copy operation, to the second node. In response to the copy operation, a second copy file is created on the second computing node of the plurality. The second copy file is related to the second file located on the first computing node of the plurality.
-
公开(公告)号:US20220358914A1
公开(公告)日:2022-11-10
申请号:US17315397
申请日:2021-05-10
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Sasikanth Eda , Sarbajit K. Rakshit , Sandeep Ramesh Patil
Abstract: A method for managing commands utilizing command boundaries includes establishing a first command boundary for a first intelligent virtual assistant operating on a first electronic device. The method also includes, responsive to receiving audio from a plurality of sources within a vicinity of the first electronic device, identifying a portion of the audio from the plurality of sources within the first command boundary. The method also includes, responsive to determining a command is identifiable in the portion of the audio from the plurality of sources within the first command boundary, sending the command to the first intelligent virtual assistant on the first electronic device.
-
-
-
-
-
-
-
-
-