Sudha R Iyer, Age 67114 Woodruff Ct, Aiken, SC 29803

Sudha Iyer Phones & Addresses

114 Woodruff Ct, Aiken, SC 29803 (803) 643-0874 (803) 643-1879

New Ellenton, SC

Union City, CA

Alameda, CA

Phoenix, AZ

Concord, CA

114 Woodruff Ct, Aiken, SC 29803 (803) 643-0874

Show more

Social networks

Sudha R Iyer

Linkedin

Work

Position: Clerical/White Collar

Education

Degree: Graduate or professional degree

Mentions for Sudha R Iyer

Sudha Iyer resumes & CV records

Resumes

Sudha Iyer Photo 27

Sudha Iyer

Publications & IP owners

Us Patents

Granular Restoration Of Virtual Machine Application Data

US Patent:
2018028, Oct 4, 2018
Filed:
Mar 28, 2018
Appl. No.:
15/939245
Inventors:
- Tinton Falls NJ, US
Sudha Krishnan Iyer - Cupertino CA, US
Jun H. Ahn - Manalapan NJ, US
Rahul S. Pawar - Marlboro NJ, US
International Classification:
G06F 11/14
Abstract:
Systems and method that restore application data stored by a virtual machine database for an application (e.g., SQL, Sharepoint, Exchange, and so on) running on the virtual machine are described. The systems and methods create an integrated snapshot of the application data stored in the virtual machine database, by creating a secondary copy of the application data stored in the virtual machine database, performing, via a virtual server agent (VSA), a software snapshot of the virtual machine, and performing, via the virtual server agent, a hardware snapshot of the software snapshot of the virtual machine.

Protecting Dynamic And Short-Lived Virtual Machine Instances In Cloud Environments

US Patent:
2017027, Sep 28, 2017
Filed:
May 5, 2016
Appl. No.:
15/147217
Inventors:
- Mountain View CA, US
Sudha IYER - Sunnyvale CA, US
International Classification:
H04L 29/06
G06F 9/50
G06F 9/455
Abstract:
The present disclosure relates to protecting temporary virtual machine instances in a cloud computing platform from security risks. An example method generally includes monitoring a cloud platform for the assignment of a temporary virtual machine instance to a workload. A security system obtains information about a configuration of the temporary virtual machine instance and applications deployed on the temporary virtual machine instance. Based on the configuration of the temporary virtual machine instance and applications deployed on the temporary virtual machine instance, the security system generates a security policy to apply to the temporary virtual machine instance.

Method And Apparatus For Detecting Security Anomalies In A Public Cloud Environment Using Network Activity Monitoring, Application Profiling And Self-Building Host Mapping

US Patent:
2017007, Mar 16, 2017
Filed:
Sep 15, 2015
Appl. No.:
14/854658
Inventors:
- Mountain View CA, US
Sudha Iyer - Sunnyvale CA, US
International Classification:
H04L 29/06
Abstract:
The disclosed computer-implemented method for detecting security anomalies in a public cloud environment using network activity monitoring, application profiling, and self-building host mapping may include (1) collecting host information that identifies (A) at least one communication channel that has previously facilitated communication between at least one host computing platform within a cloud computing environment and at least one additional computing platform and/or (B) at least one application that has previously run on the host computing platform, (2) monitoring network traffic involving the host computing platform, (3) detecting, while monitoring the network traffic, network activity that is inconsistent with the collected host information, and then (4) determining that the detected network activity represents a potential security threat within the cloud computing environment due at least in part to the detected network activity being inconsistent with the collected host information. Various other methods, systems, and computer-readable media are also disclosed.

NOTICE: You may not use PeopleBackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. PeopleBackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.