Patents by Inventor Asmahan Ali
Asmahan Ali has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11983147Abstract: A computer-implemented method, according to one embodiment, includes: receiving, at a clustered filesystem from a formatted filesystem, a request to perform a data integrity check for a portion of data. A determination is made as to whether the request includes a filesystem type of the portion of data, and in response to determining that the request includes a filesystem type of the portion of data, another determination is made as to whether the clustered filesystem supports the data integrity check for the filesystem type. In response to determining the clustered filesystem supports the data integrity check, another determination is made as to whether the portion of data is currently available. Furthermore, the computer-implemented method includes causing the data integrity check to be performed in response to determining that the portion of data is currently available. Results of performing the data integrity check are also sent to the formatted filesystem.Type: GrantFiled: June 2, 2021Date of Patent: May 14, 2024Assignee: International Business Machines CorporationInventors: Asmahan Ali, Christina Lara, Sasikanth Eda, Abhishek Jain, Sanjay Vipin Gandhi
-
Publication number: 20230385889Abstract: Provided is a computer-implemented method, system, and computer program product for predictive service orchestration using threat modeling analytics. A processor may identify a plurality of attributes of a client computing environment. The processor may collect threat modeling content for a plurality of vendor computing environments. The processor may analyze the threat modeling content for the plurality of vendor computing environments. The processor may compare the analyzed threat modeling content for the plurality of vendor computing environments with the plurality of attributes of the client computing environment. The processor may generate, based on the comparing, a client threat model for the client computing environment.Type: ApplicationFiled: May 24, 2022Publication date: November 30, 2023Inventors: ASMAHAN ALI, Mustafa Mah, Abhishek Jain, Sasikanth Eda
-
Publication number: 20230297417Abstract: A method, system, and computer program product for context relevant data migration to a cloud server with job rescheduling are provided. The method identifies a contextual situation associated with at least a portion of data sets available for migration to a cloud server by a set of data sources. The method identifies an application associated with the contextual situation. A set of use characteristics are determined for the data sets based on the contextual situation and the application. Bandwidths are determined for one or more data sources. One or more data sets are selected for prioritization based on a contextual relevance, the set of use characteristics, and the bandwidths for the one or more data sources. The method schedules a job processing sequence of the selected one or more data sets based, at least in part, on the contextual relevancy, the set of use characteristics, and the bandwidths.Type: ApplicationFiled: March 15, 2022Publication date: September 21, 2023Inventors: Asmahan Ali, Daniel De Souza Casali, Abhishek Jain, Sarbajit K. Rakshit
-
Patent number: 11650975Abstract: Online file system consistency check for container data on a clustered file system is provided via identifying inodes (index nodes) of a group of files in a clustered file system based on a cyber-resiliency for the clustered file system; grouping the inodes based on a buffer size allocated to a FSCK (File System Consistency Check) operation; passing the inodes of to the FSCK operation in a single iteration when a total size of the inodes is less than the buffer size; or when the total size of the inodes is greater than the buffer size, identifying inodes that belong to a first container and that belong to a second container; passing the inodes that belong to the first container to the FSCK operation in a first iteration; and passing, after the first iteration completes, the inodes that belong to the second container to the FSCK operation in a second iteration.Type: GrantFiled: December 11, 2020Date of Patent: May 16, 2023Assignee: International Business Machines CorporationInventors: Asmahan Ali, Christina Lara, Abhishek Jain, Sasikanth Eda
-
Publication number: 20220391353Abstract: A computer-implemented method, according to one embodiment, includes: receiving, at a clustered filesystem from a formatted filesystem, a request to perform a data integrity check for a portion of data. A determination is made as to whether the request includes a filesystem type of the portion of data, and in response to determining that the request includes a filesystem type of the portion of data, another determination is made as to whether the clustered filesystem supports the data integrity check for the filesystem type. In response to determining the clustered filesystem supports the data integrity check, another determination is made as to whether the portion of data is currently available. Furthermore, the computer-implemented method includes causing the data integrity check to be performed in response to determining that the portion of data is currently available. Results of performing the data integrity check are also sent to the formatted filesystem.Type: ApplicationFiled: June 2, 2021Publication date: December 8, 2022Inventors: Asmahan Ali, Christina Lara, Sasikanth Eda, Abhishek Jain, Sanjay Vipin Gandhi
-
Publication number: 20220188289Abstract: Online file system consistency check for container data on a clustered file system is provided via identifying inodes (index nodes) of a group of files in a clustered file system based on a cyber-resiliency for the clustered file system; grouping the inodes based on a buffer size allocated to a FSCK (File System Consistency Check) operation; passing the inodes of to the FSCK operation in a single iteration when a total size of the inodes is less than the buffer size; or when the total size of the inodes is greater than the buffer size, identifying inodes that belong to a first container and that belong to a second container; passing the inodes that belong to the first container to the FSCK operation in a first iteration; and passing, after the first iteration completes, the inodes that belong to the second container to the FSCK operation in a second iteration.Type: ApplicationFiled: December 11, 2020Publication date: June 16, 2022Inventors: Asmahan ALI, Christina LARA, Abhishek JAIN, Sasikanth EDA
-
Patent number: 11360939Abstract: Testing is performed to ensure integrity of a file system auditing component and of a file system. A list of file access events is built. This list includes expected events that should be triggered by the file system and found in a log. The events in the list are run on the file system and logged. The log of expected events is then compared with actual events logged by the file system to determine the integrity of the file system auditing component and the file system.Type: GrantFiled: May 22, 2018Date of Patent: June 14, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ali Y. Duale, Mustafa Mah, Asmahan Ali
-
Patent number: 11164663Abstract: Embodiments include method, systems and computer program products for minimizing errors in prescription medication dispensing. Aspects include obtaining, by a processor, a prescription of a medication for a patient. Then, aspects include obtaining, by the processor, a patient profile associated with the patient and obtaining, by the processor, medication details for the medication. Aspects also include displaying to the patient, by a first device, the medication details.Type: GrantFiled: November 17, 2016Date of Patent: November 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
-
Patent number: 10776640Abstract: A method for an enhanced vehicle monitoring system that utilizes cameras and other sensors to determine the state of the interior and/or exterior of a vehicle is provided. The method comprises detecting that a driver has exited a vehicle. The method further comprises monitoring a state of the vehicle. The method further comprises determining based, at least in part, on the monitoring, if an object has been left in the vehicle unintentionally or if the vehicle has been left running unattended. The method further comprises, upon determining that the object has been left in the vehicle or the vehicle has been left running unattended, sending a notification to the driver.Type: GrantFiled: January 6, 2017Date of Patent: September 15, 2020Assignee: International Business Machines CorporationInventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
-
Patent number: 10764788Abstract: In one embodiment, in accordance with the present invention, a method, computer program product, and system for managing and redistributing unused bandwidth between devices connected to a mobile telecommunications network is provided. One or more computer processors determine a predicted amount of data to be used by a mobile device. The one or more computer processors determine a surplus of allocated data based on whether the predicted amount of data is less than an allocated amount of data. The one or more computer processors, upon determining that there is a surplus of allocated data, move the surplus of allocated data to a data pool to be used by one or more additional mobile devices.Type: GrantFiled: November 29, 2017Date of Patent: September 1, 2020Assignee: International Business Machines CorporationInventors: Asmahan Ali, Ali Y. Duale, Mustafa Mah
-
Patent number: 10755122Abstract: A method for an enhanced vehicle monitoring system that utilizes cameras and other sensors to determine the state of the interior and/or exterior of a vehicle is provided. The method comprises detecting that a driver has exited a vehicle. The method further comprises monitoring a state of the vehicle. The method further comprises determining based, at least in part, on the monitoring, if an object has been left in the vehicle unintentionally or if the vehicle has been left running unattended. The method further comprises, upon determining that the object has been left in the vehicle or the vehicle has been left running unattended, sending a notification to the driver.Type: GrantFiled: December 8, 2017Date of Patent: August 25, 2020Assignee: International Business Machines CorporationInventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
-
Patent number: 10743140Abstract: In an approach to sending an alert based on a user's location, one or more computer processors identify a position of a target device as a first location based, at least in part, on data provided by one or more geolocation systems; identify a location category for the first location; determine that the identified location category is among a predetermined set of location categories; identify a time threshold for the identified location category; identify an alert that is associated with the identified location category within the database; determine an amount of time that the target device is present at the first location; and determine that the amount of time the target device is present at the first location exceeds the time threshold, and in response, sending the alert to the one or more recipient devices for the purpose of notifying users of the first location of the target device.Type: GrantFiled: May 16, 2018Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Asmahan Ali, Ali Y. Duale, Mustafa Mah
-
Patent number: 10740631Abstract: A method for an enhanced vehicle monitoring system that utilizes cameras and other sensors to determine the state of the interior and/or exterior of a vehicle is provided. The method comprises detecting that a driver has exited a vehicle. The method further comprises monitoring a state of the vehicle. The method further comprises determining based, at least in part, on the monitoring, if an object has been left in the vehicle unintentionally or if the vehicle has been left running unattended. The method further comprises, upon determining that the object has been left in the vehicle or the vehicle has been left running unattended, sending a notification to the driver.Type: GrantFiled: October 26, 2017Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
-
Patent number: 10715473Abstract: Provided are systems, methods, and media for optimized processing of message responses from multiple email recipients. An example method includes receiving, by a message exchange system, an email message from a sender that is to be transmitted to a plurality of recipients. The method includes receiving, by the message exchange system, a number of commitment messages from one or more recipients of the plurality of recipients. The method includes transmitting by the message exchange system, in response to detecting that the number of received commitment messages is equal to a requested number of responses, a first alert to a subset of recipients of the plurality of recipients indicating that the subset of recipients do not need to respond to the email message, in which the subset of recipients are the recipients who did not transmit a commitment message to the message exchange system.Type: GrantFiled: July 24, 2018Date of Patent: July 14, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ali Y. Duale, Asmahan Ali, Mustafa Mah
-
Publication number: 20200036669Abstract: Provided are systems, methods, and media for optimized processing of message responses from multiple email recipients. An example method includes receiving, by a message exchange system, an email message from a sender that is to be transmitted to a plurality of recipients. The method includes receiving, by the message exchange system, a number of commitment messages from one or more recipients of the plurality of recipients. The method includes transmitting by the message exchange system, in response to detecting that the number of received commitment messages is equal to a requested number of responses, a first alert to a subset of recipients of the plurality of recipients indicating that the subset of recipients do not need to respond to the email message, in which the subset of recipients are the recipients who did not transmit a commitment message to the message exchange system.Type: ApplicationFiled: July 24, 2018Publication date: January 30, 2020Inventors: Ali Y. Duale, Asmahan Ali, Mustafa Mah
-
Publication number: 20190361990Abstract: Testing is performed to ensure integrity of a file system auditing component and of a file system. A list of file access events is built. This list includes expected events that should be triggered by the file system and found in a log. The events in the list are run on the file system and logged. The log of expected events is then compared with actual events logged by the file system to determine the integrity of the file system auditing component and the file system.Type: ApplicationFiled: May 22, 2018Publication date: November 28, 2019Inventors: Ali Y. Duale, Mustafa Mah, Asmahan Ali
-
Publication number: 20190357010Abstract: In an approach to sending an alert based on a user's location, one or more computer processors identify a position of a target device as a first location based, at least in part, on data provided by one or more geolocation systems; identify a location category for the first location; determine that the identified location category is among a predetermined set of location categories; identify a time threshold for the identified location category; identify an alert that is associated with the identified location category within the database; determine an amount of time that the target device is present at the first location; and determine that the amount of time the target device is present at the first location exceeds the time threshold, and in response, sending the alert to the one or more recipient devices for the purpose of notifying users of the first location of the target device.Type: ApplicationFiled: May 16, 2018Publication date: November 21, 2019Inventors: Asmahan Ali, Ali Y. Duale, Mustafa Mah
-
Patent number: 10419527Abstract: The described herein relates to repairing a file system. Repairing the file system includes identifying a corrupted node of a tree corresponding to the file system and determining a status of a parent node of the corrupted node based on a status bit of the parent node. Repairing the file system also includes disabling the parent node to an off-line mode when the status bit indicates that the parent node is in an on-line mode; fixing the corrupted node while the parent node is in the off-line mode; and enabling the parent node to the on-line mode in response to fixing the at least one corrupted node.Type: GrantFiled: June 8, 2016Date of Patent: September 17, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
-
Patent number: 10412152Abstract: The described herein relates to repairing a file system. Repairing the file system includes identifying a corrupted node of a tree corresponding to the file system and determining a status of a parent node of the corrupted node based on a status bit of the parent node. Repairing the file system also includes disabling the parent node to an off-line mode when the status bit indicates that the parent node is in an on-line mode; fixing the corrupted node while the parent node is in the off-line mode; and enabling the parent node to the on-line mode in response to fixing the at least one corrupted node.Type: GrantFiled: November 24, 2015Date of Patent: September 10, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah
-
Patent number: 10332347Abstract: Methods, systems and computer program products for utilizing wearable devices in an entertainment environment are provided. Aspects include creating associations between a plurality of individuals and a plurality of wearable devices and classifying each of the plurality of individuals into one or more groups, wherein each group includes at least one child and at least one parent. Aspects also include tracking a location of one of the plurality of wearable devices associated with a first child of a first group and based on a determination that the first child is attempting to leave a predetermined area, determining whether the first child is accompanied by a first adult, wherein the first adult is a member of the first group.Type: GrantFiled: July 25, 2016Date of Patent: June 25, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Asmahan A. Ali, Ali Y. Duale, Mustafa Y. Mah