Patents by Inventor Alberto Giammaria
Alberto Giammaria has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230153225Abstract: In an approach to risk prediction for bug-introducing changes, a computer retrieves one or more historic pull requests. A computer determines a unique file linking for each file included in the historic pull requests. A computer generates a file risk dataset. A computer performs chronological partitioning on the file risk dataset. A computer determines bug-introducing changes in the file risk dataset. A computer computes a collaborative file association between two or more of the files in the file risk dataset. A computer labels each of the files in the file risk dataset with an associated risk of introducing a bug. A computer generates a labelled file risk inducing ground truth dataset. A computer inputs the labelled file risk inducing ground truth dataset to a file risk prediction model. A computer extracts pull request features from the historic pull requests. A computer generates a pull request risk prediction model.Type: ApplicationFiled: November 16, 2021Publication date: May 18, 2023Inventors: Amar Prakash Azad, Harshit Kumar, Raghav Batta, Michael Elton Nidd, Larisa Shwartz, PRITAM GUNDECHA, Alberto Giammaria
-
Patent number: 11645188Abstract: In an approach to risk prediction for bug-introducing changes, a computer retrieves one or more historic pull requests. A computer determines a unique file linking for each file included in the historic pull requests. A computer generates a file risk dataset. A computer performs chronological partitioning on the file risk dataset. A computer determines bug-introducing changes in the file risk dataset. A computer computes a collaborative file association between two or more of the files in the file risk dataset. A computer labels each of the files in the file risk dataset with an associated risk of introducing a bug. A computer generates a labelled file risk inducing ground truth dataset. A computer inputs the labelled file risk inducing ground truth dataset to a file risk prediction model. A computer extracts pull request features from the historic pull requests. A computer generates a pull request risk prediction model.Type: GrantFiled: November 16, 2021Date of Patent: May 9, 2023Assignee: International Business Machines CorporationInventors: Amar Prakash Azad, Harshit Kumar, Raghav Batta, Michael Elton Nidd, Larisa Shwartz, Pritam Gundecha, Alberto Giammaria
-
Patent number: 11119746Abstract: Extension patterns are deployed to core deployment patterns stored in a first software repository. An event relating to registration of a component is detected. In response to detecting the event, a tool registry can be queried to identify one or more extension deployment patterns for use with one or more core deployment patterns. Based upon the query, one or more extension deployment components can be retrieved from a second software repository. The one or more extension deployment components can be deployed on top of one or more instances of the one or more core deployment patterns.Type: GrantFiled: August 9, 2019Date of Patent: September 14, 2021Assignee: International Business Machines CorporationInventors: Alberto Giammaria, Christopher A. Peters, Thomas Spatzier
-
Patent number: 10983774Abstract: Extension patterns are deployed to core deployment patterns stored in a first software repository. An event relating to registration of a component is detected. In response to detecting the event, a tool registry can be queried to identify one or more extension deployment patterns for use with one or more core deployment patterns. Based upon the query, one or more extension deployment components can be retrieved from a second software repository. The one or more extension deployment components can be deployed on top of one or more instances of the one or more core deployment patterns.Type: GrantFiled: August 9, 2019Date of Patent: April 20, 2021Assignee: International Business Machines CorporationInventors: Alberto Giammaria, Christopher A. Peters, Thomas Spatzier
-
Publication number: 20190361689Abstract: Extension patterns are deployed to core deployment patterns stored in a first software repository. An event relating to registration of a component is detected. In response to detecting the event, a tool registry can be queried to identify one or more extension deployment patterns for use with one or more core deployment patterns. Based upon the query, one or more extension deployment components can be retrieved from a second software repository. The one or more extension deployment components can be deployed on top of one or more instances of the one or more core deployment patterns.Type: ApplicationFiled: August 9, 2019Publication date: November 28, 2019Inventors: Alberto Giammaria, Christopher A. Peters, Thomas Spatzier
-
Publication number: 20190361690Abstract: Extension patterns are deployed to core deployment patterns stored in a first software repository. An event relating to registration of a component is detected. In response to detecting the event, a tool registry can be queried to identify one or more extension deployment patterns for use with one or more core deployment patterns. Based upon the query, one or more extension deployment components can be retrieved from a second software repository. The one or more extension deployment components can be deployed on top of one or more instances of the one or more core deployment patterns.Type: ApplicationFiled: August 9, 2019Publication date: November 28, 2019Inventors: Alberto Giammaria, Christopher A. Peters, Thomas Spatzier
-
Patent number: 10430171Abstract: Extension patterns are deployed to core deployment patterns stored in a first software repository. An event relating to registration of a component is detected. In response to detecting the event, a tool registry can be queried to identify one or more extension deployment patterns for use with one or more core deployment patterns. Based upon the query, one or more extension deployment components can be retrieved from a second software repository. The one or more extension deployment components can be deployed on top of one or more instances of the one or more core deployment patterns.Type: GrantFiled: December 26, 2017Date of Patent: October 1, 2019Assignee: International Business Machines CorporationInventors: Alberto Giammaria, Christopher A. Peters, Thomas Spatzier
-
Patent number: 10009216Abstract: Methods, systems, and computer program products for repeat execution of RCA logic through run-time discovered topology pattern maps are provided herein. A computer-implemented method includes determining one or more topology paths of configuration items from a collection of multiple views of a target system; identifying one or more patterns from the one or more topology paths of configuration items; comparing the one or more identified patterns against a collection of data comprising mappings between (i) multiple root cause analysis logical expressions and (ii) multiple system architecture patterns, thereby identifying one or more of the multiple root cause analysis logical expressions to be executed on the one or more topology paths of configuration items; and generating a user-accessible link via a uniform resource locator for direct invocation of the one or more identified multiple root cause analysis logical expressions executed on the one or more topology paths of configuration items.Type: GrantFiled: November 12, 2015Date of Patent: June 26, 2018Assignee: International Business Machines CorporationInventors: Alberto Giammaria, Shantanu Godbole, Karthikeyan Ponnalagu, Karthik Sankaranarayanan
-
Publication number: 20180136919Abstract: Extension patterns are deployed to core deployment patterns stored in a first software repository. An event relating to registration of a component is detected. In response to detecting the event, a tool registry can be queried to identify one or more extension deployment patterns for use with one or more core deployment patterns. Based upon the query, one or more extension deployment components can be retrieved from a second software repository. The one or more extension deployment components can be deployed on top of one or more instances of the one or more core deployment patterns.Type: ApplicationFiled: December 26, 2017Publication date: May 17, 2018Inventors: Alberto Giammaria, Christopher A. Peters, Thomas Spatzier
-
Patent number: 9934013Abstract: Extension patterns are deployed to core deployment patterns stored in a first software repository. An event relating to registration of a component is detected. In response to detecting the event, a tool registry can be queried to identify one or more extension deployment patterns for use with one or more core deployment patterns. Based upon the query, one or more extension deployment components can be retrieved from a second software repository. The one or more extension deployment components can be deployed on top of one or more instances of the one or more core deployment patterns.Type: GrantFiled: March 31, 2014Date of Patent: April 3, 2018Assignee: International Business Machines CorporationInventors: Alberto Giammaria, Christopher A. Peters, Thomas Spatzier
-
Publication number: 20170220971Abstract: A social networking-based web analytics data processing system having subject matter expert (SME) cognitive capability includes a data report dashboard module, and a rating module. The data report dashboard module includes an electronic hardware controller to generate an initial web analytics data report and to generate at least one inquiry associated with at least one abnormality included in the initial web analytics data report. The rating module detects at least one of a positive ranking and a negative ranking applied to a comment submitted by a user in reply to the at least one inquiry. The social networking-based web analytics data processing system further includes a subject matter expert (SME) identification module that identifies a SME based on at least one of social networking information, community expertise ranking and project stakeholder recognitions.Type: ApplicationFiled: January 28, 2016Publication date: August 3, 2017Inventors: Alberto Giammaria, Chunhui Y. Higgins, William P. Higgins, Christopher A. Maul, John H. Walczyk, III, Ke Zhu
-
Publication number: 20170141945Abstract: Methods, systems, and computer program products for repeat execution of RCA logic through run-time discovered topology pattern maps are provided herein. A computer-implemented method includes determining one or more topology paths of configuration items from a collection of multiple views of a target system; identifying one or more patterns from the one or more topology paths of configuration items; comparing the one or more identified patterns against a collection of data comprising mappings between (i) multiple root cause analysis logical expressions and (ii) multiple system architecture patterns, thereby identifying one or more of the multiple root cause analysis logical expressions to be executed on the one or more topology paths of configuration items; and generating a user-accessible link via a uniform resource locator for direct invocation of the one or more identified multiple root cause analysis logical expressions executed on the one or more topology paths of configuration items.Type: ApplicationFiled: November 12, 2015Publication date: May 18, 2017Inventors: Alberto Giammaria, Shantanu Godbole, Karthikeyan Ponnalagu, Karthik Sankaranarayanan
-
Patent number: 9471294Abstract: Extension patterns are deployed to core deployment patterns stored in a first software repository. An event relating to registration of a component is detected. In response to detecting the event, a tool registry can be queried to identify one or more extension deployment patterns for use with one or more core deployment patterns. Based upon the query, one or more extension deployment components can be retrieved from a second software repository. The one or more extension deployment components can be deployed on top of one or more instances of the one or more core deployment patterns.Type: GrantFiled: August 21, 2014Date of Patent: October 18, 2016Assignee: International Business Machines CorporationInventors: Alberto Giammaria, Christopher A. Peters, Thomas Spatzier
-
Patent number: 9298482Abstract: A plug-in-based templatization framework for automating the creation of open virtualization framework (OVF) virtual appliance (VA) is provided. According to one embodiment, a framework is stored which comprises a plurality of product-specific add-ons. Each of the plurality of product-specific add-ons comprises a discovery element, an activation logic template element, an open virtualization package envelope template element. The plurality of product-specific add-ons are executed against a first virtual composite application instance while said the virtual composite application instance is executing in a first virtualization platform environment to automatically generate an open virtualization package template. A second virtual composite application instance is then deployed within a second virtualization platform environment utilizing the open virtualization package template.Type: GrantFiled: December 12, 2011Date of Patent: March 29, 2016Assignee: International Business Machines CorporationInventors: Narendran Sachindran, Alberto Giammaria, Manish Gupta, Manish Sethi
-
Publication number: 20150355895Abstract: A method for applying remediation policy to a cloud application package having a set of components is described. The method is initiated in response to discovery of a new vulnerability. It begins by comparing information from a deployment description against a data set of known problems associated with the one or more of the components. The deployment description represents the set of components and their interrelationships. For each of the one or more components, one or more known problems that satisfy a given severity and/or complexity criteria are identified. Thereafter, and with respect to at least one of the components for which one known problem satisfying the given criteria has been identified, the remediation policy (e.g., an update, a replacement, a patch, an additional installable) is applied to attempt to rectify the known problem. After applying the policy, the old version of the package is replaced with the new version.Type: ApplicationFiled: September 30, 2014Publication date: December 10, 2015Inventors: Alberto Giammaria, Christopher Andrew Peters, Thomas Spatzier
-
Publication number: 20150356000Abstract: A method for applying remediation policy to a cloud application package having a set of components is described. The method is initiated in response to discovery of a new vulnerability. It begins by comparing information from a deployment description against a data set of known problems associated with the one or more of the components. The deployment description represents the set of components and their interrelationships. For each of the one or more components, one or more known problems that satisfy a given severity and/or complexity criteria are identified. Thereafter, and with respect to at least one of the components for which one known problem satisfying the given criteria has been identified, the remediation policy (e.g., an update, a replacement, a patch, an additional installable) is applied to attempt to rectify the known problem. After applying the policy, the old version of the package is replaced with the new version.Type: ApplicationFiled: June 10, 2014Publication date: December 10, 2015Inventors: Alberto Giammaria, Christopher Andrew Peters, Thomas Spatzier
-
Patent number: 9195573Abstract: A method for applying remediation policy to a cloud application package having a set of components is described. The method is initiated in response to discovery of a new vulnerability. It begins by comparing information from a deployment description against a data set of known problems associated with the one or more of the components. The deployment description represents the set of components and their interrelationships. For each of the one or more components, one or more known problems that satisfy a given severity and/or complexity criteria are identified. Thereafter, and with respect to at least one of the components for which one known problem satisfying the given criteria has been identified, the remediation policy (e.g., an update, a replacement, a patch, an additional installable) is applied to attempt to rectify the known problem. After applying the policy, the old version of the package is replaced with the new version.Type: GrantFiled: June 10, 2014Date of Patent: November 24, 2015Assignee: International Business Machines CorporationInventors: Alberto Giammaria, Christopher Andrew Peters, Thomas Spatzier
-
Patent number: 9195453Abstract: A method for applying remediation policy to a cloud application package having a set of components is described. The method is initiated in response to discovery of a new vulnerability. It begins by comparing information from a deployment description against a data set of known problems associated with the one or more of the components. The deployment description represents the set of components and their interrelationships. For each of the one or more components, one or more known problems that satisfy a given severity and/or complexity criteria are identified. Thereafter, and with respect to at least one of the components for which one known problem satisfying the given criteria has been identified, the remediation policy (e.g., an update, a replacement, a patch, an additional installable) is applied to attempt to rectify the known problem. After applying the policy, the old version of the package is replaced with the new version.Type: GrantFiled: September 30, 2014Date of Patent: November 24, 2015Assignee: International Business Machines CorporationInventors: Alberto Giammaria, Christopher Andrew Peters, Thomas Spatzier
-
Publication number: 20150277883Abstract: Extension patterns are deployed to core deployment patterns stored in a first software repository. An event relating to registration of a component is detected. In response to detecting the event, a tool registry can be queried to identify one or more extension deployment patterns for use with one or more core deployment patterns. Based upon the query, one or more extension deployment components can be retrieved from a second software repository. The one or more extension deployment components can be deployed on top of one or more instances of the one or more core deployment patterns.Type: ApplicationFiled: March 31, 2014Publication date: October 1, 2015Applicant: International Business Machines CorporationInventors: Alberto Giammaria, Christopher A. Peters, Thomas Spatzier
-
Publication number: 20150277884Abstract: Extension patterns are deployed to core deployment patterns stored in a first software repository. An event relating to registration of a component is detected. In response to detecting the event, a tool registry can be queried to identify one or more extension deployment patterns for use with one or more core deployment patterns. Based upon the query, one or more extension deployment components can be retrieved from a second software repository. The one or more extension deployment components can be deployed on top of one or more instances of the one or more core deployment patterns.Type: ApplicationFiled: August 21, 2014Publication date: October 1, 2015Inventors: Alberto Giammaria, Christopher A. Peters, Thomas Spatzier