Patents by Inventor Alla Segal

Alla Segal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120203912
    Abstract: Methods and systems are provided for autonomic control and optimization of computing systems. A plurality of component models for one or more components in an autonomic computing system are maintained in a system level database. These component models are obtained from a source external to the management server including the components associated with the models. Component models are added or removed from the database or updated as need. A system level management server in communication with the database utilizes the component models maintained in the system level database and generic component models as needed to compute an optimum state of the autonomic computing system. The autonomic computing system is managed in accordance with the computed optimum state.
    Type: Application
    Filed: April 19, 2012
    Publication date: August 9, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES
    Inventors: David Michael Chess, Rajashi Das, James Edwin Hanson, Alla Segal, Gerald James Tesauro, Ian Nicholas Whalley
  • Patent number: 8214474
    Abstract: Methods and systems are provided for autonomic control and optimization of computing systems. A plurality of component models for one or more components in an autonomic computing system are maintained in a system level database. These component models are obtained from a source external to the management server including the components associated with the models. Component models are added or removed from the database or updated as need. A system level management server in communication with the database utilizes the component models maintained in the system level database and generic component models as needed to compute an optimum state of the autonomic computing system. The autonomic computing system is managed in accordance with the computed optimum state.
    Type: Grant
    Filed: April 18, 2006
    Date of Patent: July 3, 2012
    Assignee: International Business Machines Corporation
    Inventors: David Michael Chess, Rajashi Das, James Edwin Hanson, Alla Segal, Gerald James Tesauro, Ian Nicholas Whalley
  • Patent number: 8028048
    Abstract: In a distributed computing network having computers interconnected with each other, a method and apparatus of providing policy based provisioning of middleware components to provide a solution for a service. With this invention, the middleware components that are necessary to provide the solution are determined. Then, the configurations of the computers are determined so as to satisfy a selected configuration policy for a selected solution. Finally, the necessary middleware components are installed on the configured computers so that the solution can be provided. Some of the selected configuration policies are: maximization of server utilization policy, provisioning of software components requiring external access based on availability of external resources, and minimization of total time to install said determined components.
    Type: Grant
    Filed: February 27, 2007
    Date of Patent: September 27, 2011
    Assignee: International Business Machines Corporation
    Inventors: Alexei A. Karve, Ajay Mohindra, Alla Segal
  • Patent number: 7996905
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Grant
    Filed: April 3, 2008
    Date of Patent: August 9, 2011
    Assignee: Trend Micro Incorporated
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Patent number: 7958552
    Abstract: A system and method are provided to establish trust between a user and a policy system that generates recommended actions in accordance with specified policies. Trust is introduced into the policy-based system by assigning a value to each execution of each policy with respect to the policy-based system, called the instantaneous trust index. The instantaneous trust indices for each one of the policies, for the each execution of a given policy or for both are combined into the overall trust index for a given policy or for a given policy-based system. The recommended actions are processed in accordance with the level or trust associated with a given policy as expressed by the trust indices. Manual user input is provided to monitor or change the recommended actions. In addition, reinforcement learning algorithms are used to further enhance the level of trust between the user and the policy-based system.
    Type: Grant
    Filed: August 21, 2009
    Date of Patent: June 7, 2011
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, Hoi Yeung Chan, Alla Segal, Ian N. Whalley
  • Patent number: 7861300
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Grant
    Filed: June 18, 2008
    Date of Patent: December 28, 2010
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Patent number: 7788362
    Abstract: In one aspect this invention provides a computer program embodied on a computer readable medium that is executed by at least one data processor of a policy management system. The computer program includes first computer program instructions for implementing a user interface and second computer program instructions for implementing a policy manager that is coupled to the user interface via a policy repository for introducing a new attribute, using the first computer program instructions, into a policy for a policy-managed system, without requiring a change to (e.g., without having to re-write or re-compile) the second computer program instructions.
    Type: Grant
    Filed: March 20, 2008
    Date of Patent: August 31, 2010
    Assignee: International Business Machines Corporation
    Inventors: David M Chess, Murthy V Devarakonda, Alla Segal, Ian Nicholas Whalley
  • Patent number: 7676505
    Abstract: Users create, share, and build collaboration communities around tailored versions of the functional pages of a web site, such as the pages used to select and purchase products, or the pages used to present course materials in an online-learning site. The tailored versions of the web site are stored at the common web site development web site or at another server side location. Users access the tailored versions to select a tailored version for their own use and/or modification.
    Type: Grant
    Filed: January 27, 2006
    Date of Patent: March 9, 2010
    Assignee: International Business Machines Corporation
    Inventors: David M Chess, Alla Segal, Ian Nicholas Whalley, Jian Yin
  • Publication number: 20090307747
    Abstract: A system and method are provided to establish trust between a user and a policy system that generates recommended actions in accordance with specified policies. Trust is introduced into the policy-based system by assigning a value to each execution of each policy with respect to the policy-based system, called the instantaneous trust index. The instantaneous trust indices for each one of the policies, for the each execution of a given policy or for both are combined into the overall trust index for a given policy or for a given policy-based system. The recommended actions are processed in accordance with the level or trust associated with a given policy as expressed by the trust indices. Manual user input is provided to monitor or change the recommended actions. In addition, reinforcement learning algorithms are used to further enhance the level of trust between the user and the policy-based system.
    Type: Application
    Filed: August 21, 2009
    Publication date: December 10, 2009
    Applicant: International Business Machines Corporation
    Inventors: William C. Arnold, Hoi Yeung Chan, Alla Segal, Ian N. Whalley
  • Publication number: 20090300184
    Abstract: A method for automated provisioning of computing resources in a distributed computing network includes obtaining a data structure representing a resource dependency characterization of an application to be implemented over the distributed computing network, wherein the data structure indicates a set of resources to be deployed, obtaining a template that represents a predefined network topology for supporting deployment of the set of resources, mapping the set of resources represented in the data structure to the template so as to satisfy a set of component requirements to generate a deployment map, and provisioning the set of resources on a plurality of computers based on the deployment map to implement the application over the distributed computing network.
    Type: Application
    Filed: August 14, 2009
    Publication date: December 3, 2009
    Applicant: International Business Machines Corporation
    Inventors: Alexei Karve, Ajay Mohindra, Randy Allan Rendahl, Alla Segal
  • Publication number: 20090271607
    Abstract: Techniques are disclosed for the dynamic introduction of new components to be used during provisioning of solutions in data processing system environments such as service delivery environments. For example, in a provisioning system that manages provisioning of components in a data processing system, an automated method of dynamically provisioning one or more new components in the data processing system comprises the provisioning system performing the following steps. The provisioning system accepts a registration of a new component during a runtime period of the data processing system, wherein the new component has not been previously registered in the data processing system prior to the runtime period, and further wherein the registration comprises obtaining information relating to at least one of one or more prerequisites and a configuration associated with the new component. The provisioning system causes a modification to the data processing system by enabling use of the registered new component therein.
    Type: Application
    Filed: April 24, 2008
    Publication date: October 29, 2009
    Inventors: Alexei Arun Karve, Ajay Mohindra, Randy Allan Rendahl, Alla Segal
  • Patent number: 7487543
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Grant
    Filed: July 23, 2002
    Date of Patent: February 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Patent number: 7480912
    Abstract: Methods for allocation of storage resources, performance monitoring, and reallocation of resources to eliminate hot spots, by specifying high-level goals, rather than by means of low-level manual steps. Policies are specified as administrator specified constraints under which the resources are managed. Goals are specified in terms of performance, availability, and security requirements of the desired storage. As a part of the automation, this invention provides a method for analyzing capabilities of the computer storage system and forming analysis results, which are later used for determining an allocation of resources that will meet the high-level goals specified. This invention also provides methods for automatic monitoring of performance, availability, and security goals for allocated resources. If goals are not met, resources are reallocated so that the goals can be met with the allocation.
    Type: Grant
    Filed: May 29, 2003
    Date of Patent: January 20, 2009
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, Murthy V. Devarakonda, Alla Segal, Ian N. Whalley
  • Publication number: 20080294777
    Abstract: A method for automated provisioning of computing resources in a distributed computing network includes obtaining a data structure representing a resource dependency characterization of an application to be implemented over the distributed computing network, wherein the data structure indicates a set of resources to be deployed, obtaining a template that represents a predefined network topology for supporting deployment of the set of resources, mapping the set of resources represented in the data structure to the template so as to satisfy a set of component requirements to generate a deployment map, and provisioning the set of resources on a plurality of computers based on the deployment map to implement the application over the distributed computing network.
    Type: Application
    Filed: May 25, 2007
    Publication date: November 27, 2008
    Inventors: Alexei Karve, Ajay Mohindra, Randy Allan Rendahl, Alla Segal
  • Publication number: 20080256633
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Application
    Filed: June 18, 2008
    Publication date: October 16, 2008
    Inventors: William C. ARNOLD, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Publication number: 20080239985
    Abstract: A method, system and computer usable program code is disclosed for mapping a logical topology to information technology (IT) resources. The method comprises the steps of generating a logical topology of resources for a solution to a given request for resources, extracting information about shared rules and constraints on IT resources specific to a plurality of customers, and generating multiple mappings from the logical topology to the IT resources that satisfy said shared rules and constraints.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alexei A. Karve, Ajay Mohindra, Randy A. Rendahl, Alla Segal
  • Publication number: 20080235080
    Abstract: Performance prediction techniques are provided that utilize business-process information such as transaction history and log information. For example, in one aspect of the invention, a computer-based technique for providing a performance prediction service comprises the following steps/operations. First, business-process information associated with a business is obtained. Then, a performance estimation function is generated based at least in part on the business-process information, the performance estimation function being usable in responding to a query obtained from a potential customer of the business.
    Type: Application
    Filed: June 4, 2008
    Publication date: September 25, 2008
    Applicant: International Business Machines Corporation
    Inventors: David M. Chess, Sophia Krasikov, Alla Segal, Senthilnathan Velayudham
  • Publication number: 20080235387
    Abstract: In one aspect this invention provides a computer program embodied on a computer readable medium that is executed by at least one data processor of a policy management system. The computer program includes first computer program instructions for implementing a user interface and second computer program instructions for implementing a policy manager that is coupled to the user interface via a policy repository for introducing a new attribute, using the first computer program instructions, into a policy for a policy-managed system, without requiring a change to (e.g., without having to re-write or re-compile) the second computer program instructions.
    Type: Application
    Filed: March 20, 2008
    Publication date: September 25, 2008
    Inventors: David M. Chess, Murthy V. Devarakonda, Alla Segal, Ian Nicholas Whalley
  • Publication number: 20080209016
    Abstract: In a distributed computing network having computers interconnected with each other, a method and apparatus of providing policy based provisioning of middleware components to provide a solution for a service. With this invention, the middleware components that are necessary to provide the solution are determined. Then, the configurations of the computers are determined so as to satisfy a selected configuration policy for a selected solution. Finally, the necessary middleware components are installed on the configured computers so that the solution can be provided. Some of the selected configuration policies are: maximization of server utilization policy, provisioning of software components requiring external access based on availability of external resources, and minimization of total time to install said determined components.
    Type: Application
    Filed: February 27, 2007
    Publication date: August 28, 2008
    Inventors: Alexei A. Karve, Ajay Mohindra, Alla Segal
  • Patent number: 7412503
    Abstract: In one aspect this invention provides a computer program embodied on a computer readable medium that is executed by at least one data processor of a policy management system. The computer program includes first computer program instructions for implementing a user interface and second computer program instructions for implementing a policy manager that is coupled to the user interface via a policy repository for introducing a new attribute, using the first computer program instructions, into a policy for a policy-managed system, without requiring a change to (e.g., without having to re-write or re-compile) the second computer program instructions.
    Type: Grant
    Filed: November 21, 2003
    Date of Patent: August 12, 2008
    Assignee: International Business Machines Corporation
    Inventors: David M Chess, Murthy V Devarakonda, Alla Segal, Ian Nicholas Whalley