Jul 2014 to 2000 ERP Application Lead4iAPPS Solutions Private Ltd Chennai, Tamil Nadu Feb 2013 to Jun 2014 Technical Project ManagerUnitedHealthCare, CT, USA
Jun 2001 to May 2012 Sr. Application Development Consultant/ManagerRapidigm, PA, USA
Nov 1998 to Jun 2001 Sr. Oracle Financials ConsultantWipro Systems
Jun 1997 to Nov 1998 System MangerSilverline Industries
Jan 1997 to Jun 1997 Sr. System AnalystSysprom, India
Jul 1995 to Jan 1997 System Analyst
Education:
Madurai Kamaraj University 1991 B.E. in Computer Engineering
Brian Paul Heber - Delaware OH, US Kevin Kim Eschhofen - Lewis Center OH, US Ramesh Subramanian - Irvine CA, US Nelson John Norris - Marengo OH, US Ronald Richard Rautenstrauch - Huntington Beach CA, US Jon Ross Funk - Lexington OH, US Kevin Jay Bell - Centerburg OH, US Suratkal Padmanabha Shenoy - Mission Viejo CA, US Terry Dwane Bush - Westerville OH, US Farzin Kafaipour - Rancho Santa Margarita CA, US Mohammad Nanda Rahmana Marwali - Lewis Center OH, US Andy Margraff - New Albany OH, US
Assignee:
Liebert Corporation - Columbus OH
International Classification:
H02J007/00
US Classification:
307 66, 320137
Abstract:
An uninterruptible power supply is disclosed that includes a digital controller comprising a plurality of microprocessors. These microprocessors are programmed and arranged to provide various control features heretofore unavailable using analog controllers of the prior art.
Secured And Access Controlled Peer-To-Peer Resource Sharing Method And Apparatus
Brian D. Goodman - Roxbury CT, US John W. Rooney - New Fairfield CT, US Ramesh Subramanian - Woodbury CT, US William C. Sweeney - Norwalk CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/173
US Classification:
709225, 709223, 709229, 713201
Abstract:
A peer-to-peer network propagates searches from client to client. Resources within each client are selectively searched in response to authentication and authorization processes. Authentication information may be included in a search request or may be performed by an authentication process external to the client. Authorization is performed by a process external to the client. Only after authentication or authorization may resources of any particular client be accessed. The system allows for secure propagated searches and resource access in a peer-to-peer network environment. The network may further include a server for maintaining a list of clients connected to the peer-to-peer network in order to more efficiently facilitate peer-to-peer communications.
Centrally Enhanced Peer-To-Peer Resource Sharing Method And Apparatus
Brian D. Goodman - Roxbury CT, US John W. Rooney - New Fairfield CT, US Ramesh Subramanian - Woodbury CT, US William C. Sweeney - Norwalk CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/173 G06F 15/16 G06F 7/00
US Classification:
709244, 709238, 709245, 707 10
Abstract:
A peer-to-peer network has a server that maintains a list of addresses of clients connected to the peer-to-peer network. The server generates seed lists for each of the clients connected to the network from the server maintained list. The clients conduct peer-to-peer searches using the seed list provided by the server. The seed lists may be either randomly generated or generated to facilitate network objectives. The clients may periodically request seed list refreshing. The peer-to-peer network may further include authentication and authorization search security checks.
Secured And Access Controlled Peer-To-Peer Resource Sharing
Brian D. Goodman - Roxbury CT, US John W. Rooney - New Fairfield CT, US Ramesh Subramanian - Woodbury CT, US William C. Sweeney - Norwalk CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/173
US Classification:
709225, 709229, 709223, 713176, 726 4
Abstract:
A peer-to-peer network propagates searches from client to client. Resources within each client are selectively searched in response to authentication and authorization processes. Authentication information may be included in a search request or may be performed by an authentication process external to the client. Authorization is performed by a process external to the client. Only after authentication or authorization may resources of any particular client be accessed. The system allows for secure propagated searches and resource access in a peer-to-peer network environment. The network may further include a server for maintaining a list of clients connected to the peer-to-peer network in order to more efficiently facilitate peer-to-peer communications.
Centrally Enhanced Peer-To-Peer Resource Sharing Method And Apparatus
Brian D. Goodman - Roxbury CT, US John W. Rooney - New Fairfield CT, US Ramesh Subramanian - Woodbury CT, US William C. Sweeney - Norwalk CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
709225, 709230, 709231, 709232, 709244
Abstract:
A peer-to-peer network has a server that maintains a list of addresses of clients connected to the peer-to-peer network. The server generates seed lists for each of the clients connected to the network from the server maintained list. The clients conduct peer-to-peer searches using the seed list provided by the server. The seed lists may be either randomly generated or generated to facilitate network objectives. The clients may periodically request seed list refreshing. The peer-to-peer network may further include authentication and authorization search security checks.
Method, System, And Storage Medium For Providing Intelligent Distribution Of Software And Files
Nianjun Zhou - Somers NY, US Ramesh Subramanian - North Haven CT, US
Assignee:
International Business Machines - Armonk NY
International Classification:
G06F015/173 G06F009/44 G06F009/445
US Classification:
709223000, 717173000, 717178000
Abstract:
Exemplary embodiments of the invention relate to a method, system, and storage medium for providing software and file distribution management. The method comprises loading a user profile for a client system into a server via an intelligent agent. The profile contains current software installed, files downloaded, and registered channels for the client system. The method also includes listening in to registered channels by an intelligent agent resident on the client system. If a new message is received, the method includes determining if the new message is applicable to the client system. The applicable messages result in querying the client system to execute a task based upon the message, executing the task in accordance with the client system's preferences, and updating a look-up system with the results of the task execution.
Googleplus
Ramesh Subramanian
Lived:
North Haven, CT, USA Chennai, India India, USA
Work:
Quinnipiac University - University Professor IBM, University of Alaska, Bellcore, Rutgers University
Education:
Rutgers University (USA), XLRI (Jamshedpur, India), University of Madras (India)
About:
I am the Gabriel Ferrucci Professor of Computer Information Systems at Quinnipiac University, CT (USA). My academic interests include Information Systems Security, History of Technology, ICT4D, Techno...