* Presented paper on IGMP Proxy & Snooping at Nuremberg, Germany (2006) • * 1st prize for national level paper presentation: "Secure bootstrapping", numerous other awards for paper presentations, programming contests (C/VB) (2002-2005) • * State level award for debating (2002), active participation in dramatics (...-2002) • * Best Student (college) and head boy (school)
Interests
Systems programming, web security
Industries
Information Technology and Services
Resumes
Senior Member Of Technical Staff At Commvault Systems
CommVault since Oct 2009
Senior Member of Technical Staff
Citrix Systems Feb 2008 - Sep 2009
Senior Software Development Engineer
Infineon Technologies Jul 2005 - Jan 2008
Senior Software Engineer
Education:
College of Engineering Pune 2001 - 2005
Bachelor of Engineering, Computer Engineering
Modern School 1999 - 2001
XII
Skills:
Linux Firewalls
Interests:
Systems programming, web security
Honor & Awards:
* Presented paper on IGMP Proxy & Snooping at Nuremberg, Germany (2006)
* 1st prize for national level paper presentation: "Secure bootstrapping", numerous other awards for paper presentations, programming contests (C/VB) (2002-2005)
* State level award for debating (2002), active participation in dramatics (...-2002)
* Best Student (college) and head boy (school)
Us Patents
Migration Of An Existing Computing System To New Hardware
Rahul S. Pawar - Marlboro NJ, US Amit Mitkar - Neptune NJ, US Sumedh P. Degaonkar - Ocean City NJ, US
Assignee:
COMMVAULT SYSTEMS, INC. - Oceanport NJ
International Classification:
G06F 15/177
US Classification:
709221
Abstract:
Software, firmware, and systems are described herein that migrate functionality of a source physical computing device to a destination physical computing device. A non-production copy of data associated with a source physical computing device is created. A configuration of the source physical computing device is determined. A configuration for a destination physical computing device is determined based at least in part on the configuration of the source physical computing device. The destination physical computing device is provided access to data and metadata associated with the source physical computing device using the non-production copy of data associated with the source physical computing device.
Migration Of Existing Computing Systems To Cloud Computing Sites Or Virtual Machines
Amit Mitkar - Neptune NJ, US Sumedh P. Degaonkar - Ocean City NJ, US Rahul S. Pawar - Marlboro NJ, US Sri Karthik Bhagi - Hyderabad, IN
Assignee:
COMMVAULT SYSTEMS, INC. - Oceanport NJ
International Classification:
H04L 12/24 G06F 11/14
US Classification:
707649, 709220, 707644
Abstract:
Software, firmware, and systems are described herein that migrate functionality of a source physical computing device to a destination virtual machine. A non-production copy of data associated with a source physical computing device is created. A configuration of the source physical computing device is determined. A configuration for a destination virtual machine is determined based at least in part on the configuration of the source physical computing device. The destination virtual machine is provided access to data and metadata associated with the source physical computing device using the non-production copy of data associated with the source physical computing device.
Cross-Hypervisor Live-Mount Of Backed Up Virtual Machine Data
- Tinton Falls NJ, US Amit Mitkar - Manalapan NJ, US Sanjay Kumar - Morganville NJ, US Satish Chandra Kilaru - Manalapan NJ, US Sumedh Pramod Degaonkar - Sammamish WA, US
International Classification:
G06F 9/455 G06F 11/14 G06F 16/182
Abstract:
Illustrative systems and methods enable a virtual machine (“VM”) to be powered up at any hypervisor regardless of hypervisor type, based on live-mounting VM data that was originally backed up into a hypervisor-independent format by a block-level backup operation. Afterwards, the backed up VM executes anywhere anytime without needing to find a hypervisor that is the same as or compatible with the original source VM's hypervisor. The backed up VM payload data is rendered portable to any virtualized platform. Thus, a VM can be powered up at one or more test stations, data center or cloud recovery environments, and/or backup appliances, without the prior-art limitations of finding a same/compatible hypervisor for accessing and using backed up VM data. An illustrative media agent maintains cache storage that acts as a way station for data blocks retrieved from an original backup copy, and stores data blocks written by the live-mounted VM.
Data Storage Management Operations In A Secondary Storage Subsystem Using Image Recognition And Image-Based Criteria
- Tinton Falls NJ, US Unmil Vinay Tambe - Somerset NJ, US Sumedh Pramod Degaonkar - Sammamish WA, US Rajesh Kumar Singh - Ocean NJ, US Rahil Mohmed Husein Mansuri - Ocean NJ, US Srikanth Hejamadi Tati - Ocean Twp. NJ, US
International Classification:
G06F 16/51 G06F 16/583
Abstract:
A data storage management system incorporates image recognition and classification features. The illustrative system generates thumbnail images to represent images detected in secondary copies. Subsequent image recognition and classification operations are based on the thumbnail images without need to access the secondary copies from which the thumbnails were derived. The system indexes thumbnail images and respective relationships to each other and to the source secondary copies. Metadata from the source secondary copies is extracted and preserved with the thumbnails. Thumbnail images, metadata, and related index data (collectively “thumbnail data”) are stored locally in an illustrative content index server, or in an enhanced storage manager, thus improving performance without interfering with ongoing storage management operations. Features are disclosed for searching within the system and performing storage management operations based on image criteria. Access to/from other systems is also possible, e.g., for importing images and/or thumbnails.
Migration Of An Existing Computing System To New Hardware
Software, firmware, and systems are described herein that migrate functionality of a source physical computing device to a destination physical computing device. A non-production copy of data associated with a source physical computing device is created. A configuration of the source physical computing device is determined. A configuration for a destination physical computing device is determined based at least in part on the configuration of the source physical computing device. The destination physical computing device is provided access to data and metadata associated with the source physical computing device using the non-production copy of data associated with the source physical computing device.
Backup Of Containerized Applications Using A Backup Services Container And A Backup Services Container-Orchestration Pod
- Tinton Falls NJ, US Sumedh Pramod DEGAONKAR - Sammamish WA, US Sanjay KUMAR - Morganville NJ, US Shankarbabu BHAVANARUSHI - Hyderabad, IN Vikash KUMAR - Edison NJ, US
International Classification:
G06F 11/14 G06F 9/455 G06F 9/50
Abstract:
A “backup services container” comprises “backup toolkits,” which include scripts for accessing containerized applications plus enabling utilities/environments for executing the scripts. The backup services container is added to Kubernetes pods comprising containerized applications without changing other pod containers. For maximum value and advantage, the backup services container is “over-equipped” with toolkits. The backup services container selects and applies a suitable backup toolkit to a containerized application to ready it for a pending backup. Interoperability with a proprietary data storage management system provides features that are not possible with third-party backup systems. Some embodiments include one or more components of the proprietary data storage management within the illustrative backup services container. Some embodiments include one or more components of the proprietary data storage management system in a backup services pod configured in a Kubernetes node. All configurations and embodiments are suitable for cloud and/or non-cloud computing environments.
Using An Application Orchestrator Computing Environment For Automatically Scaled Deployment Of Data Protection Resources Needed For Data In A Production Cluster Distinct From The Application Orchestrator Or In Another Application Orchestrator Computing Environment
- Tinton Falls NJ, US Sanjay KUMAR - Morganville NJ, US Manas Bhikchand MUTHA - Tinton Falls NJ, US Sumedh Pramod DEGAONKAR - Sammamish WA, US
International Classification:
G06F 3/06
Abstract:
Data protection resources are automatically scaled to the needs of data source(s) in an application orchestrator computing environment, such as a cluster in a Kubernetes deployment. The approach is adaptable to data sources in production clusters or application suites that are not application orchestrator deployments, such as a cloud-based database-as-a-service (DBaaS). A data storage management system protects cluster-based data with an elastic number of data protection resources (e.g., data agents, media agents), which are deployed on demand. The number of data protection resources deployed for a particular job are appropriate to the workload(s) at present and depend on a variety of scaling factors. In some embodiments, data protection resources are deployed within the same cluster as the data sources. In other embodiments, a separate infrastructure cluster provides the data protection resources on demand, and connects to any number and types of data sources, whether cloud-based or otherwise, without limitation.
Creating Customized Bootable Image For Client Computing Device From Backup Copy
- Oceanport NJ, US Amit MITKAR - Neptune NJ, US Sumedh P. DEGAONKAR - Ocean NJ, US
International Classification:
G06F 11/14
Abstract:
According to certain aspects, a method of creating customized bootable images for client computing devices in an information management system can include: creating a backup copy of each of a plurality of client computing devices, including a first client computing device; subsequent to receiving a request to restore the first client computing device to the state at a first time, creating a customized bootable image that is configured to directly restore the first client computing device to the state at the first time, wherein the customized bootable image includes system state specific to the first client computing device at the first time and one or more drivers associated with hardware existing at time of restore on a computing device to be rebooted; and rebooting the computing device to the state of the first client computing device at the first time from the customized bootable image.
Youtube
Candid Rapid Fire With Sumedh Mudgalkar | Buc...
Watch our segment candid rapid fire with Sumedh Mudgalkar Watch this v...
Duration:
5m 12s
#sumedhmudgalkar live after completing 2 mill...
Duration:
45s
Traffic Express
Traffic Express - is the one of the best programs for generating buyer...
Duration:
1m 40s
Meditation for Passionate Kids | Sumedh Desai
Video from Shilpa Degaonkar.
Duration:
3m 4s
Kay Chook Kay Barobar | Manjha | Ashvini Bhav...
Kay Chook Kay Barobar | Manjha | Ashvini Bhave | Sumedh Mudgalkar | Ro...
Duration:
1m 1s
SUMEDH, PARTNER ,VEDANT TRIO PERFORMANCE #san...
Duration:
4m 15s
MANJHA | ASHVINI BHAVE | SUMEDH MUDGALKAR | R...
The cast and director of Manjha having some fun playing games and enac...
Duration:
7m 12s
Never Have I Ever With Sanskruti & Sumedh | B...
Presenting you our latest segment "Never Have I Ever" with Sanskruti B...