About
Uday Subbarayan is a successful software entrepreneur based in San Francisco Bay Area. He…
Articles by Uday
Activity
-
IAMConcepts will be at #GartnerIAM 2024! Looking forward to connecting with industry leaders, exploring the latest trends in IAM, and gaining…
IAMConcepts will be at #GartnerIAM 2024! Looking forward to connecting with industry leaders, exploring the latest trends in IAM, and gaining…
Liked by Uday Subbarayan
-
Excited to share that Shane Thomas, Abhi Aiyer, and I are building Mastra, a Typescript AI framework for the next million AI developers. Backstory:…
Excited to share that Shane Thomas, Abhi Aiyer, and I are building Mastra, a Typescript AI framework for the next million AI developers. Backstory:…
Liked by Uday Subbarayan
-
The Indian Diaspora is making an impact wherever they go! One example is Shyam, a great chef who has a food truck on the Hawaiian island of Kauai…
The Indian Diaspora is making an impact wherever they go! One example is Shyam, a great chef who has a food truck on the Hawaiian island of Kauai…
Liked by Uday Subbarayan
Experience
Education
-
Coimbatore Institute of Technology
-
Activities and Societies: Master thesis was about solving an NP-complete(Nondeterministic Polynomial) problem using Neural Networks. The college was under Bharathiar University during my time for awarding the degree.
http://www.citindia.com/
-
-
http://www.karunya.edu/
The college was under Bharathiar University during my time for awarding the degree. -
Publications
-
Sun Cloud Storage Object Service Guide to Amazon S3 Compatibility
The Sun Cloud Storage Object Application Programming Interface (API) enables you to use existing Amazon Simple Storage Service (S3) applications to access the Sun Cloud Storage Object Service, as well as create new applications that use semantics that are similar to Amazon S3 semantics.
-
Java One 2006, The Sun Grid Compute Utility
Sun Microsystems
Patents
-
METHODS AND SYSTEMS FOR API DECEPTION ENVIRONMENT AND API TRAFFIC CONTROL AND SECURITY
Issued US 16/788,059
The present invention relates to the field of networking and API/application security.
In particular, the invention is directed towards methods, systems and computer program products for Application Programming Interface (API) based flow control and API based security at the application layer of the networking protocol stack. The invention additionally provides an API deception environment to protect a server backend from threats, attacks and unauthorized access. -
Scalable Proxy Clusters
Issued US US 2020-0162433
The invention enables high-availability, high-scale, high security and disaster recovery for API computing, including in terms of capture of data traffic passing through proxies, routing communications between clients and servers, and load balancing and/or forwarding functions. The invention inter alia provides (i) a scalable cluster of proxies configured to route communications between clients and servers, without any single point of failure, (ii) proxy nodes configured for implementing the…
The invention enables high-availability, high-scale, high security and disaster recovery for API computing, including in terms of capture of data traffic passing through proxies, routing communications between clients and servers, and load balancing and/or forwarding functions. The invention inter alia provides (i) a scalable cluster of proxies configured to route communications between clients and servers, without any single point of failure, (ii) proxy nodes configured for implementing the scalable cluster (iii) efficient methods of configuring the proxy cluster, (iv) natural resiliency of clusters and/or proxy nodes within a cluster, (v) methods for scaling of clusters, (vi) configurability of clusters to span multiple servers, multiple racks and multiple datacenters, thereby ensuring high availability and disaster recovery (vii) switching between proxies or between servers without loss of session.
-
Methods and systems for API deception environment and API traffic control and security
Issued US US10587580B2
The present invention relates to the field of networking and API/application security. In particular, the invention is directed towards methods, systems and computer program products for Application Programming Interface (API) based flow control and API based security at the application layer of the networking protocol stack. The invention additionally provides an API deception environment to protect a server backend from threats, attacks and unauthorized access.
-
Methods and systems for API proxy based adaptive security
Issued US US10193867B2
The invention concerns API proxy based adaptive security. The invention implements adaptive security for API servers, while avoiding data bottlenecks and maintaining client experience. The invention provides methods and configurations for API security that may be employed at proxies for implementing routing decisions involving client messages received at said proxies. The invention also involves generating or collecting at proxies, log information that captures data corresponding to received…
The invention concerns API proxy based adaptive security. The invention implements adaptive security for API servers, while avoiding data bottlenecks and maintaining client experience. The invention provides methods and configurations for API security that may be employed at proxies for implementing routing decisions involving client messages received at said proxies. The invention also involves generating or collecting at proxies, log information that captures data corresponding to received client messages and responses from API servers—which log information correlates communications between clients, proxies and backend API servers, and includes data relevant for purposes generating API metrics and identifying anomalies and/or indicators of compromise. The invention yet further provides security server clusters configured for generating API metrics and/or identify anomalies or indicators of compromise—which may be used by proxies to terminate existing connections and block subsequent requests or messages from clients associated with the identified anomalies or indicators of compromise.
-
Methods and Systems for Deep Learning based API Traffic Security
Filed US U.S. Patent No. 10,681,012
The present invention relates to the field of networking and API/application security. In particular, the invention is directed towards methods, systems, and computer program products for deep learning-based API traffic analysis and network security.
-
Methods and apparatus for analyzing sequences of application programming interface traffic to identify potential malicious actions
Filed EU EP3471007A1
In some embodiments, a method includes receiving, at a processor of a server, a first application programming interface (API) call from a client device and providing an indication associated with the first API call as an input to a machine learning model such that the machine learning model identifies a set of parameters associated with a set of likely subsequent API calls. The method can further include receiving a second API call from the client device, identifying the second API call as an…
In some embodiments, a method includes receiving, at a processor of a server, a first application programming interface (API) call from a client device and providing an indication associated with the first API call as an input to a machine learning model such that the machine learning model identifies a set of parameters associated with a set of likely subsequent API calls. The method can further include receiving a second API call from the client device, identifying the second API call as an anomalous API call based on the second API call not meeting the set of parameters associated with the set of likely subsequent API calls, and sending a signal to perform a remedial action based on the identifying.
-
Policy Engine for Automating Management of Scalable Distributed Persistent Applications in a Grid
Issued US US8954584B1
The invention is about mechanisms and methods for automating management of Scalable Distributed Persistent Applications (SDPA) in a grid computing environment. These mechanisms and methods make it possible for physical and operating system resources in the grid to be dynamically allocated and/or de-allocated based upon the results of monitoring performance and monitoring usage of physical and operating system resources.
Other inventorsSee patent -
Semantic-based Switch Fabric OS
Issued US US 2006/0095584 A1
A operating system creates a semantic-based platform or fabric that provides a service oriented network.
Other inventorsSee patent -
Dual Plane, Big Data Web Service Architecture for Rapid, Iterative Engineering Design
Filed US -
The dual plane big-data web services architecture enables execution of both batch processes of large compute intensive jobs and real time collaborative streaming of big-data jobs in the cloud. This architecture also facilitates parallel workflow for executing multiple, simultaneous analysis in the Cloud or Data Center environment. The parallel workflow is supported by multiple windows for 3D visualization of big data inside web browsers over the public internet
Other inventors -
A Web-based Design Review System with Bi-Directional Dynamic Collaboration Engine for Real Time Sharing of Engineering Models & Results
Filed US -
The bidirectional dynamic collaboration engine enables engineers to invite colleagues and partners using web browsers to share 3D models and data anywhere in the world. The 3D data can be viewed as either static images or streaming graphics (w/o any plug-in). The system facilitates design reviews, commenting and annotation, recording, storing and retrieving the reviewed information and 3D views for later use.
Other inventors -
Implementing Service Level Agreement Using a Policy Engine in a Grid
Filed US -
Embodiments provide mechanisms and methods for automatically determining whether more or fewer application instances are needed in order to meet one or more criteria established by the set of policies derived from the service level agreement (SLA). Embodiments apply one or more of the policies to performance parameters and/or usage information collected from applications and nodes on which instances of the applications execute to determine whether a change in resource allocation is needed to…
Embodiments provide mechanisms and methods for automatically determining whether more or fewer application instances are needed in order to meet one or more criteria established by the set of policies derived from the service level agreement (SLA). Embodiments apply one or more of the policies to performance parameters and/or usage information collected from applications and nodes on which instances of the applications execute to determine whether a change in resource allocation is needed to meet the service level agreement.
Other inventors -
Persistent Service Management Automation
Filed US -
Th provided mechanisms and methods for automatically dynamically provisioning persistent application instances in a grid computing environment. Conceptually, a grid computing environment, or grid, is a collection of computing resources that supports persistent applications engaged in rendering services. Embodiments provide mechanisms and methods for automatically determining whether more or fewer application instances are needed in order to meet one or more criteria established by the set of…
Th provided mechanisms and methods for automatically dynamically provisioning persistent application instances in a grid computing environment. Conceptually, a grid computing environment, or grid, is a collection of computing resources that supports persistent applications engaged in rendering services. Embodiments provide mechanisms and methods for automatically determining whether more or fewer application instances are needed in order to meet one or more criteria established by the set of policies based at least in part on applying one or more policies to performance parameters and usage information collected from applications and nodes on which instances of the applications execute. These mechanisms and methods make it possible for persistent application instances to be dynamically provisioned based upon the results of monitoring performance of persistent applications and/or monitoring usage of physical and operating system resources.
Other inventors -
End-To-End Monitoring of Persistent Applications In a Grid
Filed US -
Mechanisms and methods for monitoring performance of one or more persistent applications deployed on a plurality of interconnected nodes forming a grid computing environment as well as usage of physical and operating system resources of the nodes upon which the persistent applications are executing.
Other inventors
Projects
-
Board Member, Ciespace Corporation
-
Ciespace Corporation is a software technology company based in Santa Clara, California, delivering an innovative Software-as-a-Service (SaaS) based computer-aided engineering (CAE) platform for advanced mechanical engineering design and analysis. The Ciespace solution will be the first commercially-available end-to-end CAE solution built entirely on an open, web services platform – leveraging the latest technology developments in cloud computing, high performance distributed networking, and…
Ciespace Corporation is a software technology company based in Santa Clara, California, delivering an innovative Software-as-a-Service (SaaS) based computer-aided engineering (CAE) platform for advanced mechanical engineering design and analysis. The Ciespace solution will be the first commercially-available end-to-end CAE solution built entirely on an open, web services platform – leveraging the latest technology developments in cloud computing, high performance distributed networking, and advanced graphics processing – to deliver an entirely new paradigm of engineering design and analysis solutions.
The Ciespace mission is to empower engineers with the critical tools and technology to accelerate innovation in a rapidly-changing, internet-connected global engineering marketplace. Our goal is to provide mid-market manufacturing companies with an open, easily-extendable engineering platform that will allow organizations to more effectively compete on a global basis – enabling improved collaboration, higher product quality, and shorter product design cycles – all delivered through an on-demand variable subscription and usage-based pricing model, to significantly lower the overall cost of digital simulation.Other creatorsSee project -
Sun Grid Engine
-
Grid Engine® is the leading distributed resource management system that optimizes resources in thousands of data centers by transparently selecting the resources that are best suited for each segment of work.
-
OASIS ebXML Registry
-
The goal of the ebxmlrr project is to deliver a functionally complete reference implementation for the OASIS ebXML Registry specifications as defined by the OASIS ebXML Registry Technical Committee.
-
iPlanet Market Maker
-
The iPlanet Market Maker software enables marketmakers to establish and run complete open digital marketplaces. This marketplace solution is significantly different from others, because it is based on open standards and is made of well-defined components and interfaces, thus providing the scalability, reliability, and security required by a 24x7 business-to-business service. It is not a marketplace, but a platform to enable marketplaces. Complemented by services delivered through external…
The iPlanet Market Maker software enables marketmakers to establish and run complete open digital marketplaces. This marketplace solution is significantly different from others, because it is based on open standards and is made of well-defined components and interfaces, thus providing the scalability, reliability, and security required by a 24x7 business-to-business service. It is not a marketplace, but a platform to enable marketplaces. Complemented by services delivered through external service providers in selected industries, it is designed to help marketmakers rapidly build their own independent marketplaces.
Languages
-
English
Native or bilingual proficiency
-
Tamil
Native or bilingual proficiency
Recommendations received
11 people have recommended Uday
Join now to viewMore activity by Uday
-
Happy Thanksgiving, wishing you a wonderful time with your family! I am really greatful to our customers, investors, team and mentors. Thank you! I…
Happy Thanksgiving, wishing you a wonderful time with your family! I am really greatful to our customers, investors, team and mentors. Thank you! I…
Liked by Uday Subbarayan
-
Wishing everyone an amazing Thanksgiving! I’m thankful for so much - including our gritty staff and our relentless restaurants in almost 80…
Wishing everyone an amazing Thanksgiving! I’m thankful for so much - including our gritty staff and our relentless restaurants in almost 80…
Liked by Uday Subbarayan
-
This revenue is an estimate. Cursor's success is a great lesson in company building. While others such as poolside, augment, magic are burning…
This revenue is an estimate. Cursor's success is a great lesson in company building. While others such as poolside, augment, magic are burning…
Liked by Uday Subbarayan
-
I just learned today that someone tried to fraudulently file an amended tax return in my name with the IRS. They were only stopped by the fact I had…
I just learned today that someone tried to fraudulently file an amended tax return in my name with the IRS. They were only stopped by the fact I had…
Liked by Uday Subbarayan
-
In my recent conversation with Asia Business Outlook, I discussed the challenges and opportunities shaping the future of #IoT in India. As India…
In my recent conversation with Asia Business Outlook, I discussed the challenges and opportunities shaping the future of #IoT in India. As India…
Liked by Uday Subbarayan
-
What a week in Singapore! 🔥 Hosted old friends and new at our “New Frontiers in AI” event and are so thankful to our speakers Chuen Hong Lew, Chief…
What a week in Singapore! 🔥 Hosted old friends and new at our “New Frontiers in AI” event and are so thankful to our speakers Chuen Hong Lew, Chief…
Liked by Uday Subbarayan
-
Congratulations to the entire Spectro Cloud team and Tenry Fu, Saad Malik, Gautam Joshi and David Cope on their $75M Series C led by Growth Equity at…
Congratulations to the entire Spectro Cloud team and Tenry Fu, Saad Malik, Gautam Joshi and David Cope on their $75M Series C led by Growth Equity at…
Liked by Uday Subbarayan
-
I just put the finishing touches on this session, and I can say that working with my colleagues to put it together was a very informative and…
I just put the finishing touches on this session, and I can say that working with my colleagues to put it together was a very informative and…
Liked by Uday Subbarayan
-
Yesterday, HSBC Innovation Banking and the NYSE joined forces to host the HSBC Cybersecurity Innovation Day in #SanFrancisco, bringing together…
Yesterday, HSBC Innovation Banking and the NYSE joined forces to host the HSBC Cybersecurity Innovation Day in #SanFrancisco, bringing together…
Liked by Uday Subbarayan
-
Really grateful to all the attendees of our our first-ever State of Cyber Summit (SOCS) focused on Founders starting and scaling cyber companies…
Really grateful to all the attendees of our our first-ever State of Cyber Summit (SOCS) focused on Founders starting and scaling cyber companies…
Liked by Uday Subbarayan
-
Chatting with OpenAI’s Karina Nguyen, who joined OpenAI earlier this year and within 6 months co-created and shipped Canvas. I really respect teams…
Chatting with OpenAI’s Karina Nguyen, who joined OpenAI earlier this year and within 6 months co-created and shipped Canvas. I really respect teams…
Liked by Uday Subbarayan
-
I'm hiring and have some fantastic roles open: Manager, Security Architecture & Application Security: Are you a technical expert ready to step into…
I'm hiring and have some fantastic roles open: Manager, Security Architecture & Application Security: Are you a technical expert ready to step into…
Liked by Uday Subbarayan
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More