Patents by Inventor Ali Y. Duale

Ali Y. Duale has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180115505
    Abstract: An approach for new recipient inclusion to e-mail chains. E-mail chain manager receives include participants associated with an e-mail chain, current participants in the current e-mail chain distribution and authorization rules associated with the e-mail chain. The e-mail chain manager determines inclusion authorizations for the include participants based on comparing the include participants with the authorization rules and creates authorization results associated with the include participants. In response to determining the authorization results are passed, the e-mail chain manager creates authorized include participants. The e-mail chain manager creates the participant notifications where the participant notifications are based on the authorized include participants and outputs the participant notifications based on predetermined participant preferences of the current participants.
    Type: Application
    Filed: December 28, 2017
    Publication date: April 26, 2018
    Inventors: Muneeb Arshad, Ali Y. Duale, Shailesh R. Gami, Louis P. Gomes, Vijai Kalathur, Rajaram B. Krishnamurthy
  • Patent number: 9939281
    Abstract: A method and system for building a trip plan from various sources is provided. The method includes receiving information detailing a planned trip from a social media website. A weighted rank is calculated for one or more stopover points associated with the planned trip. A route for the planned trip, customized for the current travelers, is created, based on the calculated weighted rank of the stopover points and on a selection from the current travelers.
    Type: Grant
    Filed: August 10, 2016
    Date of Patent: April 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Ali Y. Duale, Shailesh R. Gami, Louis P. Gomes, Rajaram B. Krishnamurthy
  • Publication number: 20180089677
    Abstract: Embodiments include method, systems and computer program products for transaction authorization. Aspects include receiving, by a processor, credit card information from a card holder, wherein the credit card information includes a credit card for the card holder. Obtaining a transaction code associated with the credit card and a set of transaction controls. Receiving, by a processor, a request for authorization for a charge on the credit card, the request for authorization including the transaction code, wherein the transaction code is provided by an individual that is not the card holder. Responsive to receiving the transaction code, analyzing the set of transaction controls to determine whether the charge is authorized and responsive to determining the charge is authorized, authorizing the charge on the credit card.
    Type: Application
    Filed: September 23, 2016
    Publication date: March 29, 2018
    Inventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
  • Publication number: 20180081795
    Abstract: Embodiments for automated testing of a virtualization management system are described. According to one aspect, a method includes generating a test case including a plurality of instances of commands and sending the test case to a plurality of interfaces supported by the virtualization management system. The method also includes generating a response file corresponding to each command in the test case. The method also includes comparing results from each interface to an instance of a command and in response to the results from each interface being identical, storing, the results in the response file corresponding to the command. The method also includes reporting an error in response to the results from each interface of the virtualization management system not being identical. The present document further describes examples of other aspects such as systems, computer products.
    Type: Application
    Filed: November 30, 2017
    Publication date: March 22, 2018
    Inventors: MOHAMMAD ABDIRASHID, ALI Y. DUALE, TARIQ HANIF
  • Publication number: 20180077098
    Abstract: An approach for new recipient inclusion to e-mail chains. E-mail chain manager receives include participants associated with an e-mail chain, current participants in the current e-mail chain distribution and authorization rules associated with the e-mail chain. The e-mail chain manager determines inclusion authorizations for the include participants based on comparing the include participants with the authorization rules and creates authorization results associated with the include participants. In response to determining the authorization results are passed, the e-mail chain manager creates authorized include participants. The e-mail chain manager creates the participant notifications where the participant notifications are based on the authorized include participants and outputs the participant notifications based on predetermined participant preferences of the current participants.
    Type: Application
    Filed: September 12, 2016
    Publication date: March 15, 2018
    Inventors: Muneeb Arshad, Ali Y. Duale, Shailesh R. Gami, Louis P. Gomes, Vijai Kalathur, Rajaram B. Krishnamurthy
  • Publication number: 20180060315
    Abstract: Embodiments include methods, and a file system maintenance manager, and computer program products for performing file system maintenance. Aspects may include: surveying, by a file system maintenance manager, available compute nodes, and determining an amount of file system maintenance work to be performed in an unprocessed work chunk pool. The aspect may include dispatching work chunks to the available compute nodes for performing file system maintenance. The aspect may also include monitoring status changes of the compute nodes, and adjusting the work chunks dispatched to each available compute node according to the status changes of the compute nodes. The aspect may further include detecting capacity and performance of each of compute nodes, classifying the compute nodes available into high speed, medium speed, and low speed categories, and dispatching unprocessed work chunks to each of compute nodes dynamically, according to the capacity and performance of the compute nodes.
    Type: Application
    Filed: August 31, 2016
    Publication date: March 1, 2018
    Inventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
  • Publication number: 20180045528
    Abstract: A method and system for building a trip plan from various sources is provided. The method includes receiving information detailing a planned trip from a social media website. A weighted rank is calculated for one or more stopover points associated with the planned trip. A route for the planned trip, customized for the current travelers, is created, based on the calculated weighted rank of the stopover points and on a selection from the current travelers.
    Type: Application
    Filed: August 10, 2016
    Publication date: February 15, 2018
    Inventors: Ali Y. Duale, Shailesh R. Gami, Louis P. Gomes, Rajaram B. Krishnamurthy
  • Publication number: 20180048600
    Abstract: Embodiments of the present invention provide a method, computer program product, and a computer system for predicting message personalization. According to one embodiment a message is received on a first device, wherein the message is sent from a second device, and wherein the first device and the second device are in a community. An escape character followed by a keyword in the received message is detected. A detailed message is determined based in part on the keyword in the received message associated with the community. Next the escape character and the keyword are replaced with the determined detailed message. Finally, the received message and the determined detailed message are displayed.
    Type: Application
    Filed: August 10, 2016
    Publication date: February 15, 2018
    Inventors: Ali Y. Duale, Shailesh R. Gami, Louis P. Gomes, Rajaram B. Krishnamurthy
  • Publication number: 20180048992
    Abstract: Determining an individual exceeds a time-distance from a point. Locations for a set of individuals are monitored and an alert is transmitted if an individual exceeds a time-distance from a point.
    Type: Application
    Filed: August 10, 2016
    Publication date: February 15, 2018
    Inventors: Ali Y. Duale, Shailesh R. Gami, Louis P. Gomes, Rajaram B. Krishnamurthy
  • Publication number: 20180025582
    Abstract: Methods, systems and computer program products for utilizing wearable devices in an entertainment environment are provided. Aspects include creating associations between a plurality of individuals and a plurality of wearable devices and classifying each of the plurality of individuals into one or more groups, wherein each group includes at least one child and at least one parent. Aspects also include tracking a location of one of the plurality of wearable devices associated with a first child of a first group and based on a determination that the first child is attempting to leave a predetermined area, determining whether the first child is accompanied by a first adult, wherein the first adult is a member of the first group.
    Type: Application
    Filed: July 25, 2016
    Publication date: January 25, 2018
    Inventors: ASMAHAN A. ALI, ALI Y. DUALE, MUSTAFA Y. MAH
  • Patent number: 9858177
    Abstract: Embodiments for automated testing of a virtualization management system are described. According to one aspect, a method includes generating a test case including a plurality of instances of commands and sending the test case to a plurality of interfaces supported by the virtualization management system. The method also includes generating a response file corresponding to each command in the test case. The method also includes comparing results from each interface to an instance of a command and in response to the results from each interface being identical, storing, the results in the response file corresponding to the command. The method also includes reporting an error in response to the results from each interface of the virtualization management system not being identical. The present document further describes examples of other aspects such as systems, computer products.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: January 2, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohammad Abdirashid, Ali Y. Duale, Tariq Hanif
  • Patent number: 9811339
    Abstract: A computer-implemented method for testing a hybrid architecture instruction set is provided. The method includes defining a first instruction definition table for a first base architecture, and defining a second instruction definition table for a second base architecture, wherein the first base architecture is different than the second base architecture. The method also includes defining a delta table, wherein the delta table defines architecture specific behavior, and generating a hybrid architecture table based on the delta table and at least one of the first instruction definition table or the second instruction definition table. The method includes executing a test based on the hybrid architecture table, wherein the hybrid architecture table is for a hybrid architecture that is compatible between the first base architecture and the second base architecture.
    Type: Grant
    Filed: March 8, 2017
    Date of Patent: November 7, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ali Y. Duale, Shailesh R. Gami, Dennis W. Wittig
  • Patent number: 9798597
    Abstract: An aspect includes include selective purging of entries from translation look-aside buffers (TLBs). A method includes building multiple logical systems in a computing environment, the multiple logical systems including at least two level-two guests. TLB entries are created in a TLB for the level-two guests by executing fetch and store instructions. A subset of the TLB entries is purged in response to a selective TLB purge instruction, the subset including TLB entries created for a first one of the level-two guests. Subsequent to the purging, verifying that the subset of the TLB entries were purged from the TLB, and determining whether a second one of the level-two guests is operational, the determining including executing at least one instruction that accesses a TLB entry of the second one of the level-two guests. Test results are generated based on the verifying and the determining. The test results are output.
    Type: Grant
    Filed: September 26, 2016
    Date of Patent: October 24, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ali Y. Duale, Shailesh R. Gami, John L. Weber, Dennis W Wittig
  • Patent number: 9733695
    Abstract: Aspects include a method, system, and computer program product for managing battery life in a portable terminal. Managing battery life in the portable terminal may include enabling a sleep mode in the portable terminal in response to detection of a sleep event, and enabling an operation mode in the portable terminal in response to detection of an operation event. The portable terminal may include a first processor and a second processor. The enabling the sleep mode may include reducing power consumption of the first processor. The enabling the operation mode may include detecting the operation event with the second processor while the portable terminal is in the sleep mode. A rate of battery power consumption during the sleep mode may be lower than a rate of battery power consumption during the operation mode.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: August 15, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ali Y. Duale, Shailesh R. Gami, Louis P. Gomes, Rajaram B. Krishnamurthy
  • Patent number: 9690680
    Abstract: A computer-implemented method for testing a hybrid architecture instruction set is provided. The method includes defining a first instruction definition table for a first base architecture, and defining a second instruction definition table for a second base architecture, wherein the first base architecture is different than the second base architecture. The method also includes defining a delta table, wherein the delta table defines architecture specific behavior, and generating a hybrid architecture table based on the delta table and at least one of the first instruction definition table or the second instruction definition table. The method includes executing a test based on the hybrid architecture table, wherein the hybrid architecture table is for a hybrid architecture that is compatible between the first base architecture and the second base architecture.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: June 27, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ali Y. Duale, Shailesh R. Gami, Dennis W. Wittig
  • Patent number: 9673836
    Abstract: An aspect includes receiving a symbol translation table (STT) that includes input symbols and their corresponding codewords. An entropy encoding descriptor (EED) that specifies how many of the codewords have each of the different lengths is also received. Contents of one or both of the STT and the EED are modified to generate a test case and an entropy encoding test is executed. The executing includes performing a lossless data compression process based on contents of an input data string that includes one or more of the input symbols, and on contents of the STT and the EED; or performing a data expansion process based on contents of an input data string that includes one or more of the codewords, and on contents of the STT and the EED. A result of the entropy encoding test is compared to an expected result.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: June 6, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ali Y. Duale, Shailesh R. Gami, Dennis W. Wittig
  • Publication number: 20170153693
    Abstract: Aspects include a method, system, and computer program product for managing battery life in a portable terminal. Managing battery life in the portable terminal may include enabling a sleep mode in the portable terminal in response to detection of a sleep event, and enabling an operation mode in the portable terminal in response to detection of an operation event. The portable terminal may include a first processor and a second processor. The enabling the sleep mode may include reducing power consumption of the first processor. The enabling the operation mode may include detecting the operation event with the second processor while the portable terminal is in the sleep mode. A rate of battery power consumption during the sleep mode may be lower than a rate of battery power consumption during the operation mode.
    Type: Application
    Filed: November 30, 2015
    Publication date: June 1, 2017
    Inventors: Ali Y. Duale, Shailesh R. Gami, Louis P. Gomes, Rajaram B. Krishnamurthy
  • Publication number: 20170147629
    Abstract: The described herein relates to repairing a file system. Repairing the file system includes identifying a corrupted node of a tree corresponding to the file system and determining a status of a parent node of the corrupted node based on a status bit of the parent node. Repairing the file system also includes disabling the parent node to an off-line mode when the status bit indicates that the parent node is in an on-line mode; fixing the corrupted node while the parent node is in the off-line mode; and enabling the parent node to the on-line mode in response to fixing the at least one corrupted node.
    Type: Application
    Filed: June 8, 2016
    Publication date: May 25, 2017
    Inventors: ASMAHAN A. ALI, ALI Y. DUALE, MUSTAFA Y. MAH
  • Publication number: 20170147626
    Abstract: The described herein relates to repairing a file system. Repairing the file system includes identifying a corrupted node of a tree corresponding to the file system and determining a status of a parent node of the corrupted node based on a status bit of the parent node. Repairing the file system also includes disabling the parent node to an off-line mode when the status bit indicates that the parent node is in an on-line mode; fixing the corrupted node while the parent node is in the off-line mode; and enabling the parent node to the on-line mode in response to fixing the at least one corrupted node.
    Type: Application
    Filed: November 24, 2015
    Publication date: May 25, 2017
    Inventors: ASMAHAN A. ALI, ALI Y. DUALE, MUSTAFA Y. MAH
  • Publication number: 20170132926
    Abstract: A computer-implemented method and system for vehicular traffic control and vehicle routing includes receiving a request for a best route, at a central system. The request including a current location and a destination from a requesting vehicle. Travel factors from the current location to the destination are determined. The travel factors include road availability, traffic conditions, and real time feedback, using the central system in response to receiving the request. The best route is determined for the requesting vehicle from the current location to the destination based on the travel factors, and real time feedback of the traffic conditions. The method and system includes initiating a plurality of traffic control actions along the route for the requesting vehicle. The traffic control actions are initiated along the route simultaneously and in concert with the requesting vehicle to clear the best route for the requesting vehicle to travel unobstructed to the destination.
    Type: Application
    Filed: January 20, 2017
    Publication date: May 11, 2017
    Inventors: Ali Y. Duale, Shailesh R. Gami, Louis P. Gomes, Rajaram B. Krishnamurthy