Patents by Inventor Hien Q. Nguyen
Hien Q. Nguyen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10523580Abstract: An embodiment of the invention provides a system and method for managing computing resources in a cloud computing environment, wherein the system includes a data analysis module connected to a processor. The data analysis module predicts the demand for the computing resources, wherein the demand is predicted based on internet user activity. The internet user activity includes: the number of web pages that include at least one select term a predetermined amount of times, the number of times the web pages that include the at least one select term a predetermined amount of times are viewed, and the number of times the select term is entered into an internet search engine. The processor increases resource capacity in the cloud computing environment when the predicted demand is above a first threshold. The processor decreases resource capacity in the cloud computing environment when the predicted demand is below a second threshold.Type: GrantFiled: February 16, 2016Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Shane B. McElligott, Hien Q. Nguyen, Susan M. Romero
-
Patent number: 9678746Abstract: In general, embodiments of the invention provide an approach to discover and enforce coding conventions among a group of developers. Specifically, source code files for a group of developers are imported from a code repository. The source code files are analyzed to discover the commonly used coding conventions of the group. Convention templates are generated based on these coding conventions. Each convention template is assigned a weighted value, and the convention templates are reviewed and approved based on the weighted value.Type: GrantFiled: July 31, 2014Date of Patent: June 13, 2017Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Shane B. McElligott, Hien Q. Nguyen, Jeffrey D. Young
-
Patent number: 9417867Abstract: A method for s identifying program files within one or more programs that will likely require update to implement a proposed programming task is disclosed. A processor identifies a previous programming task that matches the proposed programming task. The processor also identifies a set of program files that were updated to implement the previous programming task. The processor then displays the set of program files or existing versions of the set of program files as program files that will likely require update for the proposed programming task.Type: GrantFiled: April 10, 2014Date of Patent: August 16, 2016Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Shane B. McElligott, Hien Q. Nguyen, Susan M. Romero, Jeffrey D. Young
-
Publication number: 20160164798Abstract: An embodiment of the invention provides a system and method for managing computing resources in a cloud computing environment, wherein the system includes a data analysis module connected to a processor. The data analysis module predicts the demand for the computing resources, wherein the demand is predicted based on internet user activity. The internet user activity includes: the number of web pages that include at least one select term a predetermined amount of times, the number of times the web pages that include the at least one select term a predetermined amount of times are viewed, and the number of times the select term is entered into an internet search engine. The processor increases resource capacity in the cloud computing environment when the predicted demand is above a first threshold. The processor decreases resource capacity in the cloud computing environment when the predicted demand is below a second threshold.Type: ApplicationFiled: February 16, 2016Publication date: June 9, 2016Applicant: International Business Machines CorporationInventors: Kelly Abuelsaad, Shane B. McElligott, Hien Q. Nguyen, Susan M. Romero
-
Patent number: 9288219Abstract: An approach for monitoring and protecting electronic data in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, an activity monitor gathers characteristics of data traffic of one or more virtual machines. The data traffic is analyzed to determine whether any of the data traffic is indicative of a malicious activity (e.g., unauthorized data transfers). If it appears a VM is engaging in malicious activity, then a counter for the VM is incremented by a predefined value that is associated with the malicious activity. When the counter for the VM exceeds a point threshold, a remediation action is taken with respect to the VM.Type: GrantFiled: August 2, 2013Date of Patent: March 15, 2016Assignee: GLOBALFOUNDRIES Inc.Inventors: Kelly Abuelsaad, Don T. Bailey, Shane B. McElligott, Hien Q. Nguyen, Susan M. Romero, Jeffrey D. Young
-
Patent number: 9280394Abstract: An embodiment of the invention provides a system and method for managing computing resources in a cloud computing environment, wherein the system includes a data analysis module connected to a processor. The data analysis module predicts the demand for the computing resources, wherein the demand is predicted based on internet user activity. The internet user activity includes: the number of web pages that include at least one select term a predetermined amount of times, the number of times the web pages that include the at least one select term a predetermined amount of times are viewed, and the number of times the select term is entered into an internet search engine. The processor increases resource capacity in the cloud computing environment when the predicted demand is above a first threshold. The processor decreases resource capacity in the cloud computing environment when the predicted demand is below a second threshold.Type: GrantFiled: February 3, 2012Date of Patent: March 8, 2016Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Shane B. McElligott, Hien Q. Nguyen, Susan M. Romero
-
Publication number: 20160034275Abstract: In general, embodiments of the invention provide an approach to discover and enforce coding conventions among a group of developers. Specifically, source code files for a group of developers are imported from a code repository. The source code files are analyzed to discover the commonly used coding conventions of the group. Convention templates are generated based on these coding conventions. Each convention template is assigned a weighted value, and the convention templates are reviewed and approved based on the weighted value.Type: ApplicationFiled: July 31, 2014Publication date: February 4, 2016Inventors: Kelly Abuelsaad, Shane B. McElligott, Hien Q. Nguyen, Jeffrey D. Young
-
Publication number: 20150293762Abstract: A method for s identifying program files within one or more programs that will likely require update to implement a proposed programming task is disclosed. A processor identifies a previous programming task that matches the proposed programming task. The processor also identifies a set of program files that were updated to implement the previous programming task. The processor then displays the set of program files or existing versions of the set of program files as program files that will likely require update for the proposed programming task.Type: ApplicationFiled: April 10, 2014Publication date: October 15, 2015Applicant: International Business Machines CorporationInventors: Kelly Abuelsaad, Shane B. McElligott, Hien Q. Nguyen, Susan M. Romero, Jeffrey D. Young
-
Publication number: 20150040217Abstract: An approach for monitoring and protecting electronic data in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, an activity monitor gathers characteristics of data traffic of one or more virtual machines. The data traffic is analyzed to determine whether any of the data traffic is indicative of a malicious activity (e.g., unauthorized data transfers). If it appears a VM is engaging in malicious activity, then a counter for the VM is incremented by a predefined value that is associated with the malicious activity. When the counter for the VM exceeds a point threshold, a remediation action is taken with respect to the VM.Type: ApplicationFiled: August 2, 2013Publication date: February 5, 2015Applicant: International Business Machines CorporationInventors: Kelly Abuelsaad, Don T. Bailey, Shane B. McElligott, Hien Q. Nguyen, Susan M. Romero, Jeffrey D. Young
-
Publication number: 20130205027Abstract: An embodiment of the invention provides a system and method for managing computing resources in a cloud computing environment, wherein the system includes a data analysis module connected to a processor. The data analysis module predicts the demand for the computing resources, wherein the demand is predicted based on internet user activity. The internet user activity includes: the number of web pages that include at least one select term a predetermined amount of times, the number of times the web pages that include the at least one select term a predetermined amount of times are viewed, and the number of times the select term is entered into an internet search engine. The processor increases resource capacity in the cloud computing environment when the predicted demand is above a first threshold. The processor decreases resource capacity in the cloud computing environment when the predicted demand is below a second threshold.Type: ApplicationFiled: February 3, 2012Publication date: August 8, 2013Applicant: International Business Machines CorporationInventors: Kelly Abuelsaad, Shane B. McElligott, Hien Q. Nguyen, Susan M. Romero
-
Publication number: 20100185548Abstract: Systems and methods are provided to facilitate generation and/or negotiation of an agreement document via an agreement modeling system. According to one embodiment, agreement information associated with an agreement between a party and a counter-party is determined. An agreement document is generated in accordance with the agreement information, and it is automatically arranged for the agreement document to be received by the party and/or the counter-party. For example, an agreement modeling system controller may transmit the agreement document to the counter-party via an electronic mail address.Type: ApplicationFiled: March 29, 2010Publication date: July 22, 2010Inventors: Scot D. Wilce, Vincent A. George, Hien Q. Nguyen, Donna L. Conti, Patrick E. Harris, Donna M. Mansfield
-
Patent number: 7720729Abstract: Systems and methods are provided to facilitate generation and/or negotiation of an agreement document via an agreement modeling system. According to one embodiment, agreement information associated with an agreement between a party and a counter-party is determined. An agreement document is generated in accordance with the agreement information, and it is automatically arranged for the agreement document to be received by the party and/or the counter-party. For example, an agreement modeling system controller may transmit the agreement document to the counter-party via an electronic mail address.Type: GrantFiled: August 14, 2001Date of Patent: May 18, 2010Assignee: Golman Sachs & Co.Inventors: Scot D. Wilce, Vincent A. George, Hien Q. Nguyen, Donna L. Conti, Patrick E. Harris, Donna M. Mansfield
-
Patent number: 7231362Abstract: Systems and methods are provided to facilitate use of agreement information via an agreement modeling system. According to one embodiment, transaction information is evaluated based on agreement information stored in the agreement modeling system. According to another embodiment, an applicability of an agreement term may be determined based on agreement information, such as an expiration date associated with the agreement term. According to another embodiment, a user's access to agreement information is controlled by security information, such as a security class or attribute. According to another embodiment, multiple users may access agreement information in accordance with a concurrency management process.Type: GrantFiled: August 27, 2001Date of Patent: June 12, 2007Assignee: Goldman Sachs & Co.Inventors: Scot D. Wilce, Vincent A. George, Hien Q. Nguyen, Donna L. Conti, Patrick E. Harris, Donna M. Mansfield
-
Publication number: 20030097552Abstract: A device apparatus and method is detailed that allows for improved operation and configuration of the communication device with a boot PROM selecting and loading from a management device. The improved communication device apparatus and method allows for the communication device to utilize a device ID and the routines stored on the boot PROM to connect to a management device and select and download the most appropriate operating software and/or firmware for the communication device model and revision. The improved device apparatus and method also allows for the selection and download of a diagnostic program for improved evaluation and testing of the communication device.Type: ApplicationFiled: November 19, 2001Publication date: May 22, 2003Inventors: Robert E. Lewis, Hien Q. Nguyen, Daryl G. Baxa, David Stone, Parisa Salimi
-
Publication number: 20030023528Abstract: Systems and methods are provided to facilitate use of agreement information via an agreement modeling system. According to one embodiment, transaction information is evaluated based on agreement information stored in the agreement modeling system. According to another embodiment, an applicability of an agreement term may be determined based on agreement information, such as an expiration date associated with the agreement term. According to another embodiment, a user's access to agreement information is controlled by security information, such as a security class or attribute. According to another embodiment, multiple users may access agreement information in accordance with a concurrency management process.Type: ApplicationFiled: August 27, 2001Publication date: January 30, 2003Inventors: Scot D. Wilce, Vincent A. George, Hien Q. Nguyen, Donna L. Conti, Patrick E. Harris, Donna M. Mansfield
-
Publication number: 20030023527Abstract: Systems and methods are provided to facilitate generation and/or negotiation of an agreement document via an agreement modeling system. According to one embodiment, agreement information associated with an agreement between a party and a counter-party is determined. An agreement document is generated in accordance with the agreement information, and it is automatically arranged for the agreement document to be received by the party and/or the counter-party. For example, an agreement modeling system controller may transmit the agreement document to the counter-party via an electronic mail address.Type: ApplicationFiled: August 14, 2001Publication date: January 30, 2003Inventors: Scot D. Wilce, Vincent A. George, Hien Q. Nguyen, Donna L. Conti, Patrick E. Harris, Donna M. Mansfield
-
Publication number: 20030023539Abstract: Systems and methods are provided for facilitating definition of an agreement between a party and a counter-party via an agreement modeling system. According to some embodiments, an agreement type is automatically determined based on a covered products matrix and a plurality of product types associated with an agreement (e.g., financial products associated with a transaction agreement). In addition, an agreement term may be determined in accordance with the agreement type. According to other embodiments, an indication of an agreement term is stored in association with an indication of a term date such that an applicability of the agreement term can be automatically determined based at least in part on the term date. In still other embodiments, a value associated with an agreement term is stored along with an indication of a right associated with the agreement term (e.g., via an XML data format).Type: ApplicationFiled: July 27, 2001Publication date: January 30, 2003Inventors: Scot D. Wilce, Vincent A. George, Hien Q. Nguyen, Donna L. Conti, Patrick E. Harris, Donna M. Mansfield