Patents by Inventor Alla Segal

Alla Segal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080189787
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Application
    Filed: April 3, 2008
    Publication date: August 7, 2008
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Publication number: 20070245004
    Abstract: Methods and systems are provided for autonomic control and optimization of computing systems. A plurality of component models for one or more components in an autonomic computing system are maintained in a system level database. These component models are obtained from a source external to the management server including the components associated with the models. Component models are added or removed from the database or updated as need. A system level management server in communication with the database utilizes the component models maintained in the system level database and generic component models as needed to compute an optimum state of the autonomic computing system. The autonomic computing system is managed in accordance with the computed optimum state.
    Type: Application
    Filed: April 18, 2006
    Publication date: October 18, 2007
    Inventors: David Chess, Rajashi Das, James Hanson, Alla Segal, Gerald Tesauro, Ian Whalley
  • Publication number: 20070220137
    Abstract: A system, computer program and method for inspection of a system under inspection. The system may include an inspection program configured to access information available at the system under inspection and generate inspection data for the system under inspection. A runtime platform independent from the inspection program at the system under inspection is configured to limit the limit the contents of the inspection data to a maximum information content. A trusted third-party computer system may assist in selecting the inspection program and transferring the resulting inspection data.
    Type: Application
    Filed: March 17, 2006
    Publication date: September 20, 2007
    Inventors: David Chess, Sophia Krasikov, David Levine, John Morar, Edward Pring, Alla Segal, Ian Whalley
  • Publication number: 20070185927
    Abstract: Users create, share, and build collaboration communities around tailored versions of the functional pages of a web site, such as the pages used to select and purchase products, or the pages used to present course materials in an online-learning site. The tailored versions of the web site are stored at the common web site development web site or at another server side location. Users access the tailored versions to select a tailored version for their own use and/or modification.
    Type: Application
    Filed: January 27, 2006
    Publication date: August 9, 2007
    Inventors: David Chess, Alla Segal, Ian Whalley, Jian Yin
  • Patent number: 7216343
    Abstract: A method, apparatus, and computer instructions for updating a software component. A determination is made as to whether to update the software component. The software component is updated to form an updated software component in response to a determination to update the software component. The updated software component is automatically tested. A corrective action is performed in response to a failure in testing of the updated component.
    Type: Grant
    Filed: September 20, 2002
    Date of Patent: May 8, 2007
    Assignee: International Business Machines Corporation
    Inventors: Rajarshi Das, Edwin Richie Lassettre, Alla Segal, Ian Nicholas Whalley, Steve Richard White
  • Patent number: 7194445
    Abstract: A method, computer program product, and data processing system for recognizing, tracing, diagnosing, and repairing problems in an autonomic computing system is disclosed. Rules and courses of actions to follow in logging data, in diagnosing faults (or threats of faults), and in treating faults (or threats of faults) are formulated using an adaptive inference and action system. The adaptive inference and action system includes techniques for conflict resolution that generate, prioritize, modify, and remove rules based on environment-specific information, accumulated time-sensitive data, actions taken, and the effectiveness of those actions. Thus, the present invention enables a dynamic, autonomic computing system to formulate its own strategy for self-administration, even in the face of changes in the configuration of the system.
    Type: Grant
    Filed: September 20, 2002
    Date of Patent: March 20, 2007
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Hoi Yeung Chan, Rajarshi Das, Jeffrey Owen Kephart, Alla Segal
  • Publication number: 20060287970
    Abstract: A system for automatically screening resumes and/or job/admission applications for false information as well as for specific factors that make a particular candidate non-suitable for a particular job or school. The tool can also be used to generate questions that could be asked of a specific candidate based on the information provided in the resume. Such a tool may optionally include a database preconfigured with some of the information pertinent to a specific field/group of jobs. It can also optionally include the list of well-known companies hiring candidates with specific backgrounds, the contact e-mail and the information of the skills that could be utilized by each company in a given year. The system allows for manual as well as automated updates (e.g. live update from the service provider) of the database.
    Type: Application
    Filed: May 31, 2005
    Publication date: December 21, 2006
    Inventors: David Chess, Sophia Krasikov, Alla Segal
  • Publication number: 20060288412
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Application
    Filed: September 1, 2006
    Publication date: December 21, 2006
    Inventors: William Arnold, David Chess, John Morar, Alla Segal, Ian Whalley, Steve White
  • Publication number: 20060277591
    Abstract: A system and method are provided to establish trust between a user and a policy system that generates recommended actions in accordance with specified policies. Trust is introduced into the policy-based system by assigning a value to each execution of each policy with respect to the policy-based system, called the instantaneous trust index. The instantaneous trust indices for each one of the policies, for the each execution of a given policy or for both are combined into the overall trust index for a given policy or for a given policy-based system. The recommended actions are processed in accordance with the level or trust associated with a given policy as expressed by the trust indices. Manual user input is provided to monitor or change the recommended actions. In addition, reinforcement learning algorithms are used to further enhance the level of trust between the user and the policy-based system.
    Type: Application
    Filed: June 6, 2005
    Publication date: December 7, 2006
    Inventors: William Arnold, Hoi Chan, Alla Segal, Ian Whalley
  • Patent number: 7103913
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Grant
    Filed: May 8, 2002
    Date of Patent: September 5, 2006
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Publication number: 20060111960
    Abstract: Performance prediction techniques are provided that utilize business-process information such as transaction history and log information. For example, in one aspect of the invention, a computer-based technique for providing a performance prediction service comprises the following steps/operations. First, business-process information associated with a business is obtained. Then, a performance estimation function is generated based at least in part on the business-process information, the performance estimation function being usable in responding to a query obtained from a potential customer of the business.
    Type: Application
    Filed: November 22, 2004
    Publication date: May 25, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Chess, Sophia Krasikov, Alla Segal, Senthilnathan Velayudham
  • Patent number: 6981279
    Abstract: A system and a method are disclosed for dynamically analyzing software, some of whose potentially-important behaviors (such as worm-like behavior) may only be displayed when the software is executed in an environment where it has, or appears to have, access to a production network and/or to the global Internet. The software can be executed in a real or an emulated network environment that includes a monitoring component and an emulation component. The monitoring component serves to capture and/or record the behaviors displayed by the software and/or other components of the system, and the emulation component gives the software being analyzed the impression that it is executing with access to a production network and/or to the global Internet. The software being analyzed is effectively confined to the analysis network environment, and cannot in fact read information from, or alter any information on, any production network or the global Internet.
    Type: Grant
    Filed: August 17, 2000
    Date of Patent: December 27, 2005
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton G. Swimmer, Ian N. Whalley, Steve R. White
  • Publication number: 20050114532
    Abstract: In one aspect this invention provides a computer program embodied on a computer readable medium that is executed by at least one data processor of a policy management system. The computer program includes first computer program instructions for implementing a user interface and second computer program instructions for implementing a policy manager that is coupled to the user interface via a policy repository for introducing a new attribute, using the first computer program instructions, into a policy for a policy-managed system, without requiring a change to (e.g., without having to re-write or re-compile) the second computer program instructions.
    Type: Application
    Filed: November 21, 2003
    Publication date: May 26, 2005
    Inventors: David Chess, Murthy Devarakonda, Alla Segal, Ian Whalley
  • Publication number: 20040243692
    Abstract: System, apparatus and methods for allocation of storage resources, performance monitoring, and reallocation of resources to eliminate hot spots, by specifying high-level goals, rather than by means of low-level manual steps. Policies are specified as administrator specified constraints under which the resources are managed. Goals are specified in terms of performance, availability, and security requirements of the desired storage. As a part of the automation, this invention provides for analyzing capabilities of the computer storage system and forming analysis results, which are later used for determining an allocation of resources that will meet the high-level goals specified. This invention also provides automatic monitoring of performance, availability, and security goals for allocated resources. If goals are not met, resources are reallocated so that the goals can be met with the allocation.
    Type: Application
    Filed: May 29, 2003
    Publication date: December 2, 2004
    Applicant: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, Murthy V. Devarakonda, Alla Segal, Ian N. Whalley
  • Patent number: 6766475
    Abstract: A method is disclosed for automatically exercising a target application process having a Graphical User Interface (GUI), as is a system for implementing a method and a computer program, stored on a computer readable medium, that embodies the method. The method includes the computer executed steps of starting the target application process; detecting a presence of a first window opened by the target application process; processing the first window by determining a content of the first window, including a list of user controls; exercising the user controls until all of the user controls have been exercised, with user controls likely to cause termination being identified and exercised after user controls that are less likely to cause termination; and closing the first window. The step of exercising includes steps of estimating a best order of execution of user controls and text to be input to user input fields.
    Type: Grant
    Filed: January 4, 2001
    Date of Patent: July 20, 2004
    Assignee: International Business Machines Corporation
    Inventors: Alla Segal, Morton G. Swimmer, Jean-Michel Boulay
  • Publication number: 20040122846
    Abstract: A system for providing fact verification for a body of text. The system includes either or both of: a fact-identification arrangement which automatically identifies at least one subset of the body of text potentially containing a fact-based statement; and a fact-verification arrangement which is adapted to automatically consult at least one information source towards determining whether at least one fact contained in a fact-based statement is true or false.
    Type: Application
    Filed: December 19, 2002
    Publication date: June 24, 2004
    Applicant: IBM Corporation
    Inventors: David M. Chess, Sophia Krasikov, John F. Morar, Alla Segal
  • Publication number: 20040060044
    Abstract: A method, apparatus, and computer instructions for updating a software component. A determination is made as to whether to update the software component. The software component is updated to form an updated software component in response to a determination to update the software component. The updated software component is automatically tested. A corrective action is performed in response to a failure in testing of the updated component.
    Type: Application
    Filed: September 20, 2002
    Publication date: March 25, 2004
    Applicant: International Business Machines Corporation
    Inventors: Rajarshi Das, Edwin Richie Lassettre, Alla Segal, Ian Nicholas Whalley, Steve Richard White
  • Publication number: 20040059966
    Abstract: A method, computer program product, and data processing system for recognizing, tracing, diagnosing, and repairing problems in an autonomic computing system is disclosed. Rules and courses of actions to follow in logging data, in diagnosing faults (or threats of faults), and in treating faults (or threats of faults) are formulated using an adaptive inference and action system. The adaptive inference and action system includes techniques for conflict resolution that generate, prioritize, modify, and remove rules based on environment-specific information, accumulated time-sensitive data, actions taken, and the effectiveness of those actions. Thus, the present invention enables a dynamic, autonomic computing system to formulate its own strategy for self-administration, even in the face of changes in the configuration of the system.
    Type: Application
    Filed: September 20, 2002
    Publication date: March 25, 2004
    Applicant: International Business Machines Corporation
    Inventors: Hoi Yeung Chan, Rajarshi Das, Jeffrey Owen Kephart, Alla Segal
  • Publication number: 20040019832
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Application
    Filed: July 23, 2002
    Publication date: January 29, 2004
    Applicant: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Publication number: 20030212906
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Application
    Filed: May 8, 2002
    Publication date: November 13, 2003
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White