Dylan B. Ashe - Sunnyvale CA Lewis Karl Cirne - Santa Cruz CA Jeffrey Robert Cobb - Sunnyvale CA Ramesh Gupta - San Jose CA Eric Charles Schlegel - Redmond WA
Assignee:
Apple Computer, Inc. - Cupertino CA
International Classification:
G06F 1721
US Classification:
345810, 715530
Abstract:
A system for providing polymorphic image data for images in a graphical user interface on a computer system includes an operating system, and an imaging object structure, the imaging object structure included in the operating system and utilized to generate images in the graphical user interface. Additionally, the imaging object structure further comprises a subclass of imaging objects, the subclasses includes singular imaging objects and composite imaging objects. The singular imaging objects further include, but are not limited to, text imaging objects, picture imaging objects, pattern imaging objects, and icon imaging objects. Additionally, the composite imaging objects generate composite images of a desired combination of singular images generated by the singular imaging objects. Further, the imaging object structure includes a SOM object structure.
Hierarchy-Based Method And Apparatus For Detecting Attacks On A Computer System
Ramesh M. Gupta - San Jose CA, US Parveen K. Jain - San Jose CA, US Keith E. Amidon - Fremont CA, US Fengmin Gong - Livermore CA, US Srikant Vissamsetti - Fremont CA, US Steve M. Haeffele - Los Gatos CA, US Ananth Raman - San Jose CA, US
A method of provisioning a computer against computer attacks includes constructing a hierarchy characterizing different computer attacks and counter measures, and traversing this hierarchy to identify computer attacks and countermeasures relevant to a target platform. Detection and protection measures are collected in response to this traversing. These detection and protection measures are then downloaded to a security sensor associated with the target platform.
Protocol-Parsing State Machine And Method Of Using Same
Ramesh M. Gupta - San Jose CA, US Parveen K. Jain - San Jose CA, US Keith E. Amidon - Fremont CA, US Fengmin Gong - Livermore CA, US Srikant Vissamsetti - Fremont CA, US Steve M. Haeffele - Los Gatos CA, US Ananth Raman - San Jose CA, US
Assignee:
McAfee, Inc. - Santa Clara CA
International Classification:
G06F 5/00 G08B 23/00 G06F 11/30
US Classification:
726 23, 726 22, 713188, 370473, 370351, 370218
Abstract:
An intrusion signature describing an attack is stored on a computer. Once a plurality of internet protocol packets is received, the plurality of internet protocol packets collectively containing an information sequence within a series of states, it is rearranged so as to place the information sequence in order. Each state of the series of states is then successively examined so as to correlate the information sequence to the intrusion signature.
Virtual Intrusion Detection System And Method Of Using Same
Ramesh M. Gupta - San Jose CA, US Parveen K. Jain - San Jose CA, US Keith E. Amidon - Fremont CA, US Fengmin Gong - Livermore CA, US Srikant Vissamsetti - Fremont CA, US Steve M. Haeffele - Los Gatos CA, US Ananth Raman - San Jose CA, US
Assignee:
McAfee, Inc. - Santa Clara CA
International Classification:
G06F 11/00 G06F 9/00
US Classification:
726 23, 726 11, 726 22, 726 24, 726 25
Abstract:
A method of forming a virtual intrusion detection system includes the step of positioning a set of sensors in a network environment, each sensor supporting multiple logical traffic paths. The method also includes the step of providing a set of sensor management systems corresponding to the set of sensors. This set of sensor management systems enforces a set of virtual intrusion detection systems, wherein each virtual intrusion detection system corresponds to a predetermined logical traffic path through the set of sensors, each virtual detection system providing sensor traffic information solely to authorized parties.
Integrated Firewall, Ips, And Virus Scanner System And Method
Steven M. Haeffele - Los Gatos CA, US Ramesh M. Gupta - San Jose CA, US Ananth Raman - San Jose CA, US Srikant Vissamsetti - Fremont CA, US
Assignee:
McAfee, Inc. - Santa Clara CA
International Classification:
G06F 21/00 G06F 11/30
US Classification:
726 1, 726 22
Abstract:
A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a plurality of virtual intrusion prevention systems (IPSs), and a plurality of virtual virus scanners. Further, each of the virtual firewalls, IPSs, and virus scanners is assigned to at least one of a plurality of user and is configured in a user-specific.
Method And Apparatus For Detecting Intrusions On A Computer System
Ramesh M. Gupta - San Jose CA, US Parveen K. Jain - San Jose CA, US Keith E. Amidon - Fremont CA, US Fengmin Gong - Livermore CA, US Srikant Vissamsetti - Fremont CA, US Steve M. Haeffele - Los Gatos CA, US Ananth Raman - San Jose CA, US
A method of detecting intrusions on a computer includes the step of identifying an internet protocol field range describing fields within internet protocol packets received by a computer. A connectivity range is also established which describes a distribution of network traffic received by the computer. An internet protocol field threshold and a connectivity threshold are then determined from the internet protocol field range and connectivity range, respectively. During the operation of the computer, values are calculated for the internet protocol field range and connectivity range. These values are compared to the internet protocol metric threshold and connectivity metric threshold so as to identify an intrusion on the computer.
Method And System For Image Rendering Including Polymorphic Image Data In A Graphical User Interface
Dylan B. Ashe - Sunnyvale CA, US Lewis K. Cirne - Santa Cruz CA, US Jeffrey R. Cobb - Sunnyvale CA, US Ramesh Gupta - San Jose CA, US Eric C. Schlegel - Redmond WA, US
Assignee:
Apple, Inc. - Cupertino CA
International Classification:
G06F 17/00
US Classification:
715810, 715201, 715211, 715233, 715763, 717108
Abstract:
A method and system are provided for developing images for use in a graphical user interface. In one implementation, the method includes displaying a graphical user interface on a display device, and providing an operating system on a computer that is in communication with the display device. The operating system includes an imaging object structure that is an abstract base class from which subclasses of text imaging objects, picture imaging objects, and pattern imaging objects are derivable. The subclasses of text imaging objects, picture imaging objects, and pattern imaging objects are used to respectively generate text imaging objects, picture imaging objects, and pattern imaging objects for display in the graphical user interface.
Method And Apparatus For Detecting Intrusions On A Computer System
Ramesh M. Gupta - San Jose CA, US Parveen K. Jain - San Jose CA, US Keith E. Amidon - Fremont CA, US Fengmin Gong - Livermore CA, US Srikant Vissamsetti - Fremont CA, US Steve M. Haeffele - Los Gatos CA, US Ananth Raman - San Jose CA, US
A method of detecting intrusions on a computer includes the step of identifying an internet protocol field range describing fields within internet protocol packets received by a computer. A connectivity range is also established which describes a distribution of network traffic received by the computer. An internet protocol field threshold and a connectivity threshold are then determined from the internet protocol field range and connectivity range, respectively. During the operation of the computer, values are calculated for the internet protocol field range and connectivity range. These values are compared to the internet protocol metric threshold and connectivity metric threshold so as to identify an intrusion on the computer.
Isbn (Books And Publications)
Toxicology of Organophosphate and Carbamate Pesticides
Persistent Systems since Oct 2012
Account Manager
Persistent Systems Nov 2010 - Oct 2012
Sr. Project Manager
Persistent Systems 2009 - Oct 2010
Senior Technical Specialist
Wipro Technologies - USA Sep 2006 - Nov 2009
Technical Project Manager
ANZ May 2005 - May 2006
Team Lead
Education:
Bangalore University 2000 - 2003
Master of Computer Applications (MCA), Computer Science
Certifications:
MCTS : .NET Framework 3.5, ASP.NET, Microsoft MCP: Developing Applications with C++ Using the Microsoft® Foundation Class Library, Microsoft
eBay since Apr 2006
Unix Administrator
Fiorano Software 2003 - 2005
Sr. Systems Administrator
Fiorano Inc., Bangalore, India 2003 - 2005
System Administrator
VGL Softech India Ltd. Sep 2001 - Dec 2002
System Administrator
Spectranet 2000 - 2001
Systems Engineer
Education:
Kendriya Vidyalaya
Skills:
Solaris Apache Linux Load Balancing F5 BigIP Netscaler Linux KVM Virtualization Sendmail Shell Scripting DNS Red Hat Linux NFS Ubuntu Servers RedHat TCP/IP High Availability Cisco Technologies
eBay since Apr 2006
Unix Administrator
Fiorano Software 2003 - 2005
Sr. Systems Administrator
Fiorano Inc., Bangalore, India 2003 - 2005
System Administrator
VGL Softech India Ltd. Sep 2001 - Dec 2002
System Administrator
Spectranet 2000 - 2001
Systems Engineer
Education:
Kendriya Vidyalaya
Skills:
Solaris Apache Linux Load Balancing F5 BigIP Netscaler Linux KVM Virtualization Sendmail Shell Scripting DNS Red Hat Linux NFS Ubuntu Servers RedHat TCP/IP
Benign Polyps of the Colon Chronic Pancreatitis Constipation Diverticulosis Esophagitis
Languages:
English Spanish
Description:
Dr. Gupta graduated from the R.n.t. Med Coll, Univ of Rajasthan, Udaipur, Rajasthan, India in 1970. He works in Fair Lawn, NJ and specializes in Gastroenterology. Dr. Gupta is affiliated with St Josephs Regional Medical Center and The Valley Hospital.
Acute Pancreatitis Anal Fissure Anal or Rectal Abscess Benign Polyps of the Colon Celiac Disease
Languages:
English Spanish
Description:
Dr. Gupta graduated from the All India Inst of Med Sci, Ansari Nagar, New Delhi, India in 1976. He works in Bakersfield, CA and specializes in Gastroenterology. Dr. Gupta is affiliated with Bakersfield Memorial Hospital and Mercy Hospital Of Bakersfield.
Dr. Gupta graduated from the All India Inst of Med Sci, Ansari Nagar, New Delhi, India in 1965. He works in Memphis, TN and specializes in Rheumatology and Internal Medicine. Dr. Gupta is affiliated with Methodist University Hospital and Saint Francis Hospital Memphis.
Balaji Gas Services - L.P.G Pipe Line Installations R. K Gupta - L.P.G Pipe Line Installations YouTube - L.P.G Pipe Line Installations World Wrestling Entertainment - L.P.G Pipe Line Installations
Education:
L.P.G Pipe Line Installations
Tagline:
With reference to the above we are pleased to introduce ourselves as a
Ramesh Gupta
Work:
Bharti Airtel Lanka (Pvt) Ltd.
Education:
Dr.rmlau faizabad - M.a
About:
Ramesh kumar sahu saray chandel khanpur barabankimy choice is chaiting.
Bragging Rights:
M.A. kiya hai unmairised hu
Ramesh Gupta
Work:
Hindalco Industries - G/F (1974)
Education:
Hewett Polytechnic - T.D.College,Jaunpur
Ramesh Gupta
Work:
LoudCell - Founder
Education:
Indian Institute of Science, National Institute of Technology, Kurukshetra
Senior advocates Abhishek Manu Singhvi, Harin Raval and Ramesh Gupta appeared for the Congress leaders and moved separate pleas seeking exemption from personal appearance for their clients for Tuesday alone.During the hearing, senior counsel Ramesh Gupta told the magistrate that accused Sam Pitroda is presently in the United States and they will try their best to make sure he appears before the court on December 19.
Date: Dec 08, 2015
Category: World
Source: Google
Live: 'Even God gives a second chance' pleads Delhi rape convict's mother
Senior counsel Ramesh Gupta explains to TOI why the convicts should be awarded the death sentence. In this case there is no doubt the victim was subjected to horrific torture and brutality that led to her death. In my view, for sheer brutality it qualifies to be a case fit for death penalty.
Ramesh Gupta, counsel for A. Raja and R.K. Chandolia, told the court that Mr. Raja cooperated with the CBI during the agency's searches at his residence on December 8 and 15 and appeared before it for questioning four times on December 24 and 25, January 31 and February 2.
Date: Feb 03, 2011
Category: World
Source: Google
Youtube
Main To Chanda Si Gori Naar SAWAN AYA RE (194...
SAWAN AYA RE (1949) KISHORE SAHU, RAMOLA, SOFIA, DAVID, MOHANA, GULAB,...
Category:
Entertainment
Uploaded:
18 Dec, 2009
Duration:
3m 31s
Aya Aya Re Aya Sawan Dekho Aya Re SAWAN AYA R...
SAWAN AYA RE (1949) KISHORE SAHU, RAMOLA, SOFIA, DAVID, MOHANA, GULAB,...
Category:
Entertainment
Uploaded:
18 Dec, 2009
Duration:
3m 22s
Yahi Fariyad Karte Hum SAWAN AYA RE (1949).avi
SAWAN AYA RE (1949) KISHORE SAHU, RAMOLA, SOFIA, DAVID, MOHANA, GULAB,...
Category:
Entertainment
Uploaded:
18 Dec, 2009
Duration:
3m 2s
Main To Gavan Chali Hoon Kahe Bole Papiha SAW...
SAWAN AYA RE (1949) KISHORE SAHU, RAMOLA, SOFIA, DAVID, MOHANA, GULAB,...
Category:
Entertainment
Uploaded:
18 Dec, 2009
Duration:
3m 25s
Khushi Ki Aas Rahi SAWAN AYA RE (1949).avi
SAWAN AYA RE (1949) KISHORE SAHU, RAMOLA, SOFIA, DAVID, MOHANA, GULAB,...
Category:
Entertainment
Uploaded:
18 Dec, 2009
Duration:
3m 3s
Panghat Par Pani Bharne1943(Pangh...
SN Tripathy, Rajkumari in film Panghat 1943,Music By SN Tripathy, Rame...