Patents by Inventor Alaa S. Youssef
Alaa S. Youssef has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240126526Abstract: Mechanisms are provided for improving performance of container images. Container image chunks are generated from a container image file and input into one or more trained machine learning (ML) computer models, trained to classify container image chunks with regard to a plurality of container image performance characteristic classifications. For each container image chunk it is determined whether the a corresponding classification is negative, and in response to the classification being negative, an entry in a knowledge base having patterns of content matching content in the container image chunk is identified to determine one or more reasons for modification of the chunk specified in the entry. A notification output is generated specifying the container image chunks, their corresponding container image performance characteristic classifications, and the reasons for modification of the chunks.Type: ApplicationFiled: October 14, 2022Publication date: April 18, 2024Inventors: Abhishek Malvankar, Alaa S. Youssef, Chen Wang, Mariusz Sabath
-
Publication number: 20230418687Abstract: A computer-implemented method, a computer system and a computer program product boost efficiency through energy-aware workload placement. The method includes obtaining an energy profile for a plurality of computer servers and power consumption data for each computer server in the plurality of computer servers. The method also includes determining an optimal temperature for each computer server in the plurality of computer servers based on the energy profile. The method further includes determining a target processor utilization for each computer server in the plurality of computer servers based on the optimal temperature. In addition, the method includes calculating an efficiency rank for each computer server in the plurality of computer servers based on the target processor utilization and the power consumption data. Lastly, the method includes deploying a workload on a computer server with a highest efficiency rank.Type: ApplicationFiled: June 28, 2022Publication date: December 28, 2023Inventors: Asser Nasreldin Tantawi, Tamar Eilam, Ramachandra Rao Kolluri, Eun Kyung LEE, Arun Vishwanath, Alaa S. Youssef
-
Publication number: 20230214257Abstract: Systems, computer-implemented methods, and computer program products to facilitate using multiple quota trees in resource scheduling are provided. According to an embodiment, a system can comprise a processor that executes computer executable components stored in memory. The computer executable components comprise an evaluation component that executes admissibility of a job request based on a scope property of one or more quota trees that apply to the job request.Type: ApplicationFiled: January 5, 2022Publication date: July 6, 2023Inventors: Lior Aronovich, Alaa S. Youssef, Asser Nasreldin Tantawi, Diana Jeanne Arroyo, Marius Ion Danciu
-
Publication number: 20230214267Abstract: Systems, computer-implemented methods, and computer program products to facilitate optimization of resource usage based on quota trees are provided. According to an embodiment, a system can comprise a processor that executes computer executable components stored in memory. The computer executable components comprise a determination component that determines one or more quota trees that classify a job request as inadmissible. The computer executable components further comprise an optimization component that optimizes resource usage to enable admissibility of the job request based on the one or more quota trees.Type: ApplicationFiled: January 5, 2022Publication date: July 6, 2023Inventors: Lior Aronovich, Alaa S. Youssef, Asser Nasreldin Tantawi, Diana Jeanne Arroyo, Marius Ion Danciu
-
Patent number: 11677549Abstract: A processor may generate one or more encrypted policies associated with a policy creator. A processor may generate token metadata associated with a user utilizing the one or more encrypted policies. A processor may encrypt the token metadata to form encrypted token metadata. A processor may send the one or more encrypted policies and the encrypted token metadata to a policy evaluator. The policy evaluator may evaluate the one or more encrypted policies and the encrypted token metadata. The processor may return a response. The response may be based on the evaluation by the policy evaluator.Type: GrantFiled: March 30, 2021Date of Patent: June 13, 2023Assignee: International Business Machines CorporationInventors: Jia Jun Brandon Lum, Mariusz Sabath, Alaa S. Youssef
-
Patent number: 11663505Abstract: A shift-left analysis system receives information regarding an application implemented by one or more microservices. The system determines a microservice performance metric based on a performance prediction model for each microservice of the application. The system outputs an application performance metric for the application based on the microservice performance metrics determined for the one or more microservices of application.Type: GrantFiled: March 10, 2020Date of Patent: May 30, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jinho Hwang, Li Zhang, Maja Vukovic, Alaa S. Youssef
-
Patent number: 11528197Abstract: One or more systems, computer-implemented methods, and computer program products to facilitate a process for consensus regarding proceeding with a request of a transaction are provided. A system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a services component that operates a service of a transaction, where the services component approaches consensus regarding a request of the transaction by communicating with one or more other services components that operate one or more other services immediately upstream or downstream in the transaction to the service. The services component can approach the consensus by communicating only with the one or more other services components. To approach the consensus, the services component can communicate one or more messages that include one or more requests, votes or final decisions.Type: GrantFiled: August 4, 2021Date of Patent: December 13, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alaa S. Youssef, Jim Alain Laredo
-
Patent number: 11513842Abstract: Systems, computer-implemented methods, and computer program products that can facilitate performance biased resource scheduling based on runtime performance of a certain workload type on one or more nodes are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a performance component that assigns performance points to different nodes based on execution of one or more workload types. The computer executable components can further comprise a scheduler extender component that modifies a scheduling decision to run a workload type on a node based on the performance points.Type: GrantFiled: October 3, 2019Date of Patent: November 29, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Chen Wang, Stefania V. Costache, Alaa S. Youssef, Ali Kanso, Tonghoon Suk, Asser Narsreldin Tantawi
-
Publication number: 20220335318Abstract: Techniques regarding anomaly forecasting are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a forecast component that can determine a probability of a computer application executing an anomaly state based on a probabilistic graph that is incrementally updated while the computer application is running.Type: ApplicationFiled: June 23, 2021Publication date: October 20, 2022Inventors: Chen Wang, Alaa S. Youssef, Josep Lluis Berral Garcia
-
Patent number: 11474905Abstract: Methods, computer program products, and/or systems are provided that perform the following operations: obtaining data indicative of a node failure; obtaining data associated with nodes and pods started on each node; generating a causation score for each pod associated with a failed node, wherein each pod associated with the failed node is designated as a candidate pod for the node failure; determining pod rescheduling for each candidate pod associated with the failed node based, at least in part, on a pod ranking of the causation score for each pod; and providing the pod rescheduling to a node cluster to restart each pod associated with the failed node.Type: GrantFiled: December 10, 2020Date of Patent: October 18, 2022Assignee: International Business Machines CorporationInventors: Chen Wang, Ali Kanso, Alaa S. Youssef
-
Publication number: 20220321335Abstract: A processor may generate one or more encrypted policies associated with a policy creator. A processor may generate token metadata associated with a user utilizing the one or more encrypted policies. A processor may encrypt the token metadata to form encrypted token metadata. A processor may send the one or more encrypted policies and the encrypted token metadata to a policy evaluator. The policy evaluator may evaluate the one or more encrypted policies and the encrypted token metadata. The processor may return a response. The response may be based on the evaluation by the policy evaluator.Type: ApplicationFiled: March 30, 2021Publication date: October 6, 2022Inventors: JIA JUN BRANDON LUM, Mariusz Sabath, Alaa S. Youssef
-
Publication number: 20220188192Abstract: Methods, computer program products, and/or systems are provided that perform the following operations: obtaining data indicative of a node failure; obtaining data associated with nodes and pods started on each node; generating a causation score for each pod associated with a failed node, wherein each pod associated with the failed node is designated as a candidate pod for the node failure; determining pod rescheduling for each candidate pod associated with the failed node based, at least in part, on a pod ranking of the causation score for each pod; and providing the pod rescheduling to a node cluster to restart each pod associated with the failed node.Type: ApplicationFiled: December 10, 2020Publication date: June 16, 2022Inventors: Chen Wang, Ali Kanso, Alaa S. Youssef
-
Patent number: 11263333Abstract: An example operation may include one or more one or more of receiving two or more authorization decisions from two or more authorization entities into a blockchain system, recording the two or more authorization decisions into one or more blocks of a blockchain of the blockchain system, determining, by the blockchain system, whether the two or more authorization decisions satisfy a policy to authorize access to at least one of a device or identifiable content on the device, and when the two or more authorization decisions satisfy the policy, authorizing access to a public key that can be used to gain access to the device.Type: GrantFiled: April 25, 2019Date of Patent: March 1, 2022Assignee: International Business Machines CorporationInventors: Alaa S. Youssef, Giovanni Pacifici, Dimitrios Pendarakis
-
Patent number: 11170105Abstract: Verifying authenticity of software updates is provided. An update executable and an update behavior profile corresponding to a software update are hashed using a cryptographic hash function. A hash of the update executable and the update behavior profile is signed using a private key to form a hashed update digital signature.Type: GrantFiled: February 28, 2019Date of Patent: November 9, 2021Assignee: International Business Machines CorporationInventors: Jia Jun Brandon Lum, Alaa S. Youssef
-
Publication number: 20210287108Abstract: A shift-left analysis system receives information regarding an application implemented by one or more microservices. The system determines a microservice performance metric based on a performance prediction model for each microservice of the application. The system outputs an application performance metric for the application based on the microservice performance metrics determined for the one or more microservices of application.Type: ApplicationFiled: March 10, 2020Publication date: September 16, 2021Inventors: Jinho Hwang, Li Zhang, Maja Vukovic, Alaa S. Youssef
-
Publication number: 20210103468Abstract: Systems, computer-implemented methods, and computer program products that can facilitate performance biased resource scheduling based on runtime performance of a certain workload type on one or more nodes are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a performance component that assigns performance points to different nodes based on execution of one or more workload types. The computer executable components can further comprise a scheduler extender component that modifies a scheduling decision to run a workload type on a node based on the performance points.Type: ApplicationFiled: October 3, 2019Publication date: April 8, 2021Inventors: Chen Wang, Stefania V. Costache, Alaa S. Youssef, Ali Kanso, Tonghoon Suk, Asser Narsreldin Tantawi
-
Patent number: 10915369Abstract: Technology for selecting job characteristics to determine the similarity among jobs in terms of performance. Technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to successful performance of a requested new job by a cloud. Also, technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to failure when performing a requested new job by the cloud. When the new job request is accepted, because its characteristics of the new job matches job characteristics characterized by success and/or fails to match job characteristics characterized by failure, then the new job is said to lead to a “reward” or an “expected reward” because the new job will be rewarded by being allowed to use, by an admission controller of a cloud management system, use of cloud computing resources of the cloud.Type: GrantFiled: November 29, 2018Date of Patent: February 9, 2021Assignee: International Business Machines CorporationInventors: Chen Wang, Ali Kanso, Stefania V. Costache, Alaa S. Youssef, Malgorzata Steinder
-
Publication number: 20200342132Abstract: An example operation may include one or more one or more of receiving two or more authorization decisions from two or more authorization entities into a blockchain system, recording the two or more authorization decisions into one or more blocks of a blockchain of the blockchain system, determining, by the blockchain system, whether the two or more authorization decisions satisfy a policy to authorize access to at least one of a device or identifiable content on the device, and when the two or more authorization decisions satisfy the policy, authorizing access to a public key that can be used to gain access to the device.Type: ApplicationFiled: April 25, 2019Publication date: October 29, 2020Applicants: International Business Machines Corporation, International Business Machines CorporationInventors: Alaa S. Youssef, Giovanni Pacifici, Dimitrios Pendarakis
-
Publication number: 20200279044Abstract: Verifying authenticity of software updates is provided. An update executable and an update behavior profile corresponding to a software update are hashed using a cryptographic hash function. A hash of the update executable and the update behavior profile is signed using a private key to form a hashed update digital signature.Type: ApplicationFiled: February 28, 2019Publication date: September 3, 2020Inventors: Jia Jun Brandon Lum, Alaa S. Youssef
-
Publication number: 20200174842Abstract: Technology for selecting job characteristics to determine the similarity among jobs in terms of performance. Technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to successful performance of a requested new job by a cloud. Also, technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to failure when performing a requested new job by the cloud. When the new job request is accepted, because its characteristics of the new job matches job characteristics characterized by success and/or fails to match job characteristics characterized by failure, then the new job is said to lead to a “reward” or an “expected reward” because the new job will be rewarded by being allowed to use, by an admission controller of a cloud management system, use of cloud computing resources of the cloud.Type: ApplicationFiled: November 29, 2018Publication date: June 4, 2020Inventors: Chen Wang, Ali Kanso, Stefania V. Costache, Alaa S. Youssef, Malgorzata Steinder