Search

Ajay A Apte

from Austin, TX
Age ~53

Ajay Apte Phones & Addresses

  • 15807 Hamden Cir, Austin, TX 78717 (512) 828-4673
  • 1801 Wells Branch Pkwy, Austin, TX 78728
  • Larose, LA
  • Leesburg, VA
  • Saint Louis, MO
  • Boca Raton, FL
  • Alameda, CA
  • 13108 Zen Gardens Way, Austin, TX 78732 (512) 633-1305

Work

Company: Ibm Position: Ibm fellow - cloud infrastructure services

Education

Degree: Master of Science, Masters School / High School: Washington University In St. Louis 1992 to 1994 Specialities: Computer Science

Skills

Solution Architecture • Software Design • Websphere Application Server • Leadership • Cloud Computing • Middleware • Web Services • Websphere • Java Enterprise Edition • Software Development • Architectures • Architecture • Unix • Java • Soa • Enterprise Architecture • Agile Methodologies • Enterprise Software • Service Oriented Architecture • System Administration

Industries

Computer Software

Resumes

Resumes

Ajay Apte Photo 1

Ibm Fellow - Cloud Infrastructure Services

View page
Location:
Austin, TX
Industry:
Computer Software
Work:
Ibm
Ibm Fellow - Cloud Infrastructure Services
Education:
Washington University In St. Louis 1992 - 1994
Master of Science, Masters, Computer Science
University of Mumbai 1988 - 1992
Bachelor of Engineering, Bachelors
Skills:
Solution Architecture
Software Design
Websphere Application Server
Leadership
Cloud Computing
Middleware
Web Services
Websphere
Java Enterprise Edition
Software Development
Architectures
Architecture
Unix
Java
Soa
Enterprise Architecture
Agile Methodologies
Enterprise Software
Service Oriented Architecture
System Administration

Business Records

Name / Title
Company / Classification
Phones & Addresses
Ajay Apte
Secretary
AUSTIN MARATHI MANDAL
Nonclassifiable Establishments
PO Box 200182, Austin, TX 78720
5024 Barlow Dr, Round Rock, TX 78681
12800 Council Blf Dr, Austin, TX 78727
8705 Gln Cyn Dr, Round Rock, TX 78681

Publications

Us Patents

Client Authentication By Server Not Known At Request Time

View page
US Patent:
6467040, Oct 15, 2002
Filed:
Dec 11, 1998
Appl. No.:
09/210092
Inventors:
Ajay A. Apte - Austin TX
Sreedhar Arda - Austin TX
William Mitchell Edwards - Pflugerville TX
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 900
US Classification:
713168, 713200
Abstract:
A method for providing network security is disclosed wherein a network is comprised of at least one client and at least one server. The server identity may be unknown at the time of a client request. The method begins when a client transmits an information processing request and a negotiator object reference to a server. The server receives the information processing request and the negotiator object reference. If the server can process the request it becomes the accepting server. If the server cannot process the request, the server retransmits the request. This process continues until an accepting server is located. Next, the accepting server initiates a server request for the client to process an authentication object in response to the received negotiator object reference. The accepting server determines whether the client has the authentication object and if the client does not have the authentication object the accepting server sends the authentication object to the client. Then the client processes a method on the authentication object.

Runtime Object Binding In Scripting

View page
US Patent:
6662236, Dec 9, 2003
Filed:
Jun 29, 1998
Appl. No.:
09/106628
Inventors:
Ajay Apte - Austin TX
Ping Chen - Austin TX
John Sanchez - Pflugerville TX
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 900
US Classification:
709320, 709332, 717115
Abstract:
A method of providing a script for a computer application, by creating an object-oriented scripting environment which allows a user to enter separate code as a script, registering one or more objects with the scripting environment using a script macro, and instantiating the objects at runtime using a script code. The script macro may be re-used to instantiate multiple sets of objects named in the script code. Objects are registered with only names and classes, and then instantiated by determining one or more classes of the objects, and rebuilding class information. The application may be a Java applet which includes the script macro, and the instantiation includes instantiating a Java bean named in the script code. The Java bean may be instantiated by first determining its attributes, and then invoking the bean using a customizer. Since the objects are not stored at design time, objects can be scripted even if they cannot be saved (e. g.

Method And Apparatus For Verifying Enterprise Java Beans

View page
US Patent:
6684387, Jan 27, 2004
Filed:
Sep 23, 1999
Appl. No.:
09/404404
Inventors:
Liane Elizabeth Haynes Acker - Orange Park FL
Ajay A. Apte - Austin TX
Ping Chen - Austin TX
Karalee Brown LeBlanc - Austin TX
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 944
US Classification:
717126, 707203
Abstract:
The introspection capability of Java is utilized by the described verification tool to verify validity of a target beans Java Archive (JAR) file. The deployment descriptor class is verified first according to Enterprise Java Bean. specification rules. The remaining classes: remote interface, home interface and bean class are all loaded into a Java Virtual Machine (JVM) and verified by the described verification tool through Java introspection.

Method And Apparatus For Passing Null References Between Software Components Through Legacy Framework

View page
US Patent:
6775822, Aug 10, 2004
Filed:
Oct 19, 2000
Appl. No.:
09/692552
Inventors:
Ajay A. Apte - Austin TX
Christohper Lawrence Brealey - Markham, CA
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 945
US Classification:
717120, 717136, 709202, 719317
Abstract:
Intermediary frameworks allow software components to agree on sentinel values. When a software component attempts to pass a null value to a software component that does not support null values, an intermediate framework replaces the null value with a corresponding sentinel value. When a software component that is not null-capable attempts to pass a sentinel value to a null-capable software component, the intermediate framework replaces the sentinel with a null value. The sentinel values may be randomly generated or assigned by a user. A sentinel value is a valid data value that is never used during program execution. A user may designate the sentinel values based on the data models of the software components.

Process And System For A Client Object To Perform A Remote Method Invocation Of A Method In A Server Object

View page
US Patent:
6959307, Oct 25, 2005
Filed:
Nov 3, 2003
Appl. No.:
10/700181
Inventors:
Ajay Arvind Apte - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F017/30
US Classification:
7071041, 707 10
Abstract:
An adapter is generated by introspecting on the interfaces of an Enterprise JavaBean (EJB) running on a CORBA server. The adapter resides on the Java client-side and contains a remote proxy of the CORBA server that runs the EJB. The adapter is a Java class that implements the interfaces specified by the EJB for invoking its business methods. Adapters delegate all of the business method calls from the client to the CORBA proxy on the server and perform data marshalling from the Java client to the CORBA proxy and vice versa. Any business method calls made by the client to the adapter are delegated by the adapter to the CORBA proxy after appropriate data conversion. Thus, the adapter acts as transparent glue between the Java client and the EJB on the CORBA server.

Method And System For Application Installation And Management Using An Application-Based Naming System Including Aliases

View page
US Patent:
7210125, Apr 24, 2007
Filed:
Jul 17, 2003
Appl. No.:
10/621885
Inventors:
David Yu Chang - Austin TX, US
William Mitchell Edwards - Pflugerville TX, US
Ajay Arvind Apte - Austin TX, US
Leigh Allen Williamson - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/45
US Classification:
717120, 717174, 707103 R
Abstract:
A method is presented for managing applications using application-based names. A naming service registers an alias name; the alias name represents a first compound name that includes an application name that is associated with an application and a deployment name that is associated with a deployment attribute that characterizes a deployment of an instance of the application. The naming service is also able to generate an application-based name associated with an application; the application-based name represents a context within a naming system, and the application-based name is a second compound name that includes the alias name. Applications are managed within a data processing system using application-based names. The first compound name can be associated with a first topology-based name that represents a first context for organizing files that are related to the instance of the application.

Method, System And Program Product For Managing Multiple Network Application Versions

View page
US Patent:
7386617, Jun 10, 2008
Filed:
May 15, 2003
Appl. No.:
10/438600
Inventors:
Ajay Arvind Apte - Austin TX, US
Srinivas Hasti - Durham NC, US
Arvind Srinivasan - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
709227, 709228, 707203
Abstract:
A session is established between a user system and an existing version of a network application. Once the session is established, session information corresponding to the session is determined and then communicated to the user system. The session information typically includes a version identifier that identifies the existing version of the network application. Requests received during the same session are accompanied with the session information. The session information is used to route the requests to the existing version of the network application.

Object Introspection For First Failure Data Capture

View page
US Patent:
7840856, Nov 23, 2010
Filed:
Nov 7, 2002
Appl. No.:
10/290212
Inventors:
Ajay A. Apte - Austin TX, US
Hany A. Salem - Pflugerville TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/00
US Classification:
714 48, 714 26
Abstract:
A solution provided here comprises transferring control to at least one data-capture component when an error occurs in a production environment, performing introspection upon an object associated with the error, and capturing data from the object. The captured data is associated with the error, and the capturing is performed at least partially through introspection. Methods for error—handling and providing diagnostic data, systems for executing such methods, and instructions on a computer-usable medium, for executing such methods, are provided.
Ajay A Apte from Austin, TX, age ~53 Get Report