Patents by Inventor Kelly Abuelsaad

Kelly Abuelsaad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160269257
    Abstract: An approach for deploying and managing applications in a networked computing environment (e.g., a cloud computing environment). A user uploads an application for deployment in the networked computing environment. Metadata of the application is analyzed and compared to metadata of previously deployed applications. Using the comparison, a set of architectures used in conjunction with previously deployed application(s) with similar platform and middleware requirements are presented to a user. The user can select an architecture for deploying the application. The application is continuously monitored after deployment, and alternative architectures to improve the application can be presented to the user, if desired.
    Type: Application
    Filed: May 25, 2016
    Publication date: September 15, 2016
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20160248804
    Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.
    Type: Application
    Filed: April 29, 2016
    Publication date: August 25, 2016
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9417867
    Abstract: A method for s identifying program files within one or more programs that will likely require update to implement a proposed programming task is disclosed. A processor identifies a previous programming task that matches the proposed programming task. The processor also identifies a set of program files that were updated to implement the previous programming task. The processor then displays the set of program files or existing versions of the set of program files as program files that will likely require update for the proposed programming task.
    Type: Grant
    Filed: April 10, 2014
    Date of Patent: August 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Shane B. McElligott, Hien Q. Nguyen, Susan M. Romero, Jeffrey D. Young
  • Patent number: 9413818
    Abstract: An approach for deploying and managing applications in a networked computing environment (e.g., a cloud computing environment). A user uploads an application for deployment in the networked computing environment. Metadata of the application is analyzed and compared to metadata of previously deployed applications. Using the comparison, a set of architectures used in conjunction with previously deployed application(s) with similar platform and middleware requirements are presented to a user. The user can select an architecture for deploying the application. The application is continuously monitored after deployment, and alternative architectures to improve the application can be presented to the user, if desired.
    Type: Grant
    Filed: February 25, 2014
    Date of Patent: August 9, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9413833
    Abstract: An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration.
    Type: Grant
    Filed: April 17, 2013
    Date of Patent: August 9, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20160227041
    Abstract: In general, embodiments of the present invention relate to conference management. Specifically, sequentially scheduled conferences (e.g., conference calls) are determined for a conference participant. The connection details (e.g., call-in details) for the second of the two conferences are retrieved. If the conference is not over when the second conference is scheduled to begin, a connection is initiated with the second conference using the connection details while maintaining a connection to the first conference.
    Type: Application
    Filed: February 4, 2015
    Publication date: August 4, 2016
    Inventors: Kelly Abuelsaad, Soobaek Jang, Maneesh Mehra, Renier R. Morales, Michael S. Rieth
  • Publication number: 20160212085
    Abstract: An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a social media message of a user. The first computing device determines that the user is not in the physical location. The first computing device determines whether to delay the posting of the social media message based on a comparison of the content of the social media message with the received user preferences.
    Type: Application
    Filed: April 7, 2016
    Publication date: July 21, 2016
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20160164798
    Abstract: An embodiment of the invention provides a system and method for managing computing resources in a cloud computing environment, wherein the system includes a data analysis module connected to a processor. The data analysis module predicts the demand for the computing resources, wherein the demand is predicted based on internet user activity. The internet user activity includes: the number of web pages that include at least one select term a predetermined amount of times, the number of times the web pages that include the at least one select term a predetermined amount of times are viewed, and the number of times the select term is entered into an internet search engine. The processor increases resource capacity in the cloud computing environment when the predicted demand is above a first threshold. The processor decreases resource capacity in the cloud computing environment when the predicted demand is below a second threshold.
    Type: Application
    Filed: February 16, 2016
    Publication date: June 9, 2016
    Applicant: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Shane B. McElligott, Hien Q. Nguyen, Susan M. Romero
  • Patent number: 9361455
    Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.
    Type: Grant
    Filed: January 2, 2013
    Date of Patent: June 7, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9342527
    Abstract: Embodiments of the present invention provide an approach for sharing electronic file metadata in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, metadata related to electronic files stored in a shared storage device is maintained and updated. Such metadata may be viewable via a user interface of one or more applications used to access the files (e.g., from a plurality of computerized/electronic devices). Among other things, the metadata may identify previous accesses of the files (e.g., by user, date/time, etc.), and may be provided in a list or the like.
    Type: Grant
    Filed: April 23, 2015
    Date of Patent: May 17, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20160127761
    Abstract: Approaches described herein provide coordination of audio and/or video recording to minimize any gaps in coverage. In one approach, users of a distributed set of recording devices are invited to join a community with other similar users via a networked application in a loosely collaborative way. The recording coordination application substantially continuously monitors the state of the recording activities and coordinates the community of users to reduce any gaps in coverage.
    Type: Application
    Filed: January 13, 2016
    Publication date: May 5, 2016
    Inventors: Kelly Abuelsaad, Gregory J. Boss, Soobaek Jang, Randy A. Rendahl
  • Publication number: 20160119420
    Abstract: An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties.
    Type: Application
    Filed: January 7, 2016
    Publication date: April 28, 2016
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20160091338
    Abstract: Generating a refueling plan for a vehicle on a route including the steps of monitoring fuel consumption of the vehicle and an amount of fuel remaining within the vehicle. When a fuel level within the vehicle falls below a threshold, determining a number of miles remaining on the route and fuel mileage of the vehicle and generating a list of fuel stations which are within driving range of the vehicle based on the vehicle's fuel mileage. The list may also include fuel stations which are outside the driving range of the vehicle which have a service for delivery of fuel to a point within the driving range of the vehicle and at least a price of the fuel and brand of the fuel at each of the fuel stations. The list of fuel stations is provided to a user of the vehicle for selecting a fuel station for refueling.
    Type: Application
    Filed: September 26, 2014
    Publication date: March 31, 2016
    Inventors: Kelly Abuelsaad, Gregory J. Boss, Kevin C. McConnell, Shane B. McElligott
  • Patent number: 9294786
    Abstract: Approaches described herein provide coordination of audio and/or video recording to minimize any gaps in coverage. In one approach, users of a distributed set of recording devices are invited to join a community with other similar users via a networked application in a loosely collaborative way. The recording coordination application substantially continuously monitors the state of the recording activities and coordinates the community of users to reduce any gaps in coverage.
    Type: Grant
    Filed: July 7, 2014
    Date of Patent: March 22, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Gregory J. Boss, Soobaek Jang, Randy A. Rendahl
  • Publication number: 20160078652
    Abstract: According to embodiments of the present invention, one or more computer processors display unstructured data. One or more computer processors display a first chart that graphically represents at least a portion of the unstructured data. In response to the first chart failing to satisfy a user-defined criteria, one or more computer processors modifies the first chart to generate a second chart that graphically represents at least a portion of the unstructured data in a user-defined manner. In certain embodiments, the unstructured data includes information that does not have a pre-defined data model and/or is not organized in a pre-defined manner.
    Type: Application
    Filed: September 12, 2014
    Publication date: March 17, 2016
    Inventors: Kelly Abuelsaad, Soobaek Jang, Daniel C. Krook, Craig M. Trim
  • Publication number: 20160078202
    Abstract: An approach for managing licenses for software installations on virtual machine (VM) instances in a networked computing environment (e.g., a cloud computing environment) is provided. Specifically, in one example, data (e.g., real-time and/or historical) pertaining to usage of a set of software installations on a set of (VM) instances in the networked computing environment is collected. When a request is received (e.g., from a requester) for a license for a particular software installation of the set of software installations, it is determined whether the license is available. If not, it is then determined whether the license is obtainable based on the collected data and a current configuration of the networked computing environment. Then, responsive to the license being obtainable, the requested license may be allocated.
    Type: Application
    Filed: November 18, 2015
    Publication date: March 17, 2016
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 9288219
    Abstract: An approach for monitoring and protecting electronic data in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, an activity monitor gathers characteristics of data traffic of one or more virtual machines. The data traffic is analyzed to determine whether any of the data traffic is indicative of a malicious activity (e.g., unauthorized data transfers). If it appears a VM is engaging in malicious activity, then a counter for the VM is incremented by a predefined value that is associated with the malicious activity. When the counter for the VM exceeds a point threshold, a remediation action is taken with respect to the VM.
    Type: Grant
    Filed: August 2, 2013
    Date of Patent: March 15, 2016
    Assignee: GLOBALFOUNDRIES Inc.
    Inventors: Kelly Abuelsaad, Don T. Bailey, Shane B. McElligott, Hien Q. Nguyen, Susan M. Romero, Jeffrey D. Young
  • Patent number: 9280394
    Abstract: An embodiment of the invention provides a system and method for managing computing resources in a cloud computing environment, wherein the system includes a data analysis module connected to a processor. The data analysis module predicts the demand for the computing resources, wherein the demand is predicted based on internet user activity. The internet user activity includes: the number of web pages that include at least one select term a predetermined amount of times, the number of times the web pages that include the at least one select term a predetermined amount of times are viewed, and the number of times the select term is entered into an internet search engine. The processor increases resource capacity in the cloud computing environment when the predicted demand is above a first threshold. The processor decreases resource capacity in the cloud computing environment when the predicted demand is below a second threshold.
    Type: Grant
    Filed: February 3, 2012
    Date of Patent: March 8, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Shane B. McElligott, Hien Q. Nguyen, Susan M. Romero
  • Publication number: 20160059962
    Abstract: In an approach to hazard detection, one or more computer processors determine whether an obstruction of view for a user in a first vehicle is detected. Responsive to determining the obstruction is detected, the one or more computer processors deploy a first unmanned aerial vehicle (UAV) associated with the first vehicle. The one or more computer processors determine whether one or more hazards associated with a path of the first vehicle are detected.
    Type: Application
    Filed: September 3, 2014
    Publication date: March 3, 2016
    Inventors: Kelly Abuelsaad, Gregory J. Boss, Kevin C. McConnell, Shane B. McElligott
  • Publication number: 20160054143
    Abstract: In an approach to providing navigation assistance, one or more computer processors receive a request for navigation assistance to a destination from a first user. The one or more computer processors dispatch a navigation assistance UAV to the first user. The one or more computer processors determine a route for the first user to follow to the destination. The one or more computer processors provide navigation assistance for the route to the first user using the navigation assistance UAV.
    Type: Application
    Filed: July 7, 2015
    Publication date: February 25, 2016
    Inventors: Kelly Abuelsaad, Gregory J. Boss, Kevin C. McConnell, Shane B. McElligott