Patents by Inventor Breno H. Leitao

Breno H. Leitao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170104718
    Abstract: A first computing system may identify a security threat located at least at a first virtual server. The first virtual server may be within a second computing system. The first computing system may provision, in response to the identifying, a first firewall associated with the first virtual server. The first firewall may include a rule to deny all communication transmitted from the first virtual server. The first computing system may execute, in response to the provisioning, a first repair operation to repair the first virtual server.
    Type: Application
    Filed: October 9, 2015
    Publication date: April 13, 2017
    Inventors: Rafael C. S. Folco, Plinio A. S. Freire, Breno H. Leitao, Tiago N. d. Santos
  • Publication number: 20170104782
    Abstract: A first computing system may identify a security threat located at least at a first virtual server. The first virtual server may be within a second computing system. The first computing system may provision, in response to the identifying, a first firewall associated with the first virtual server. The first firewall may include a rule to deny all communication transmitted from the first virtual server. The first computing system may execute, in response to the provisioning, a first repair operation to repair the first virtual server.
    Type: Application
    Filed: October 22, 2015
    Publication date: April 13, 2017
    Inventors: Rafael C. S. Folco, Plinio A. S. Freire, Breno H. Leitao, Tiago N. d. Santos
  • Publication number: 20160232079
    Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.
    Type: Application
    Filed: April 19, 2016
    Publication date: August 11, 2016
    Inventors: Tiago N. dos Santos, Rafael C.S. Folco, Breno H. Leitao
  • Patent number: 9396100
    Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.
    Type: Grant
    Filed: December 5, 2014
    Date of Patent: July 19, 2016
    Assignee: International Business Machines Corporation
    Inventors: Tiago N. dos Santos, Rafael C. S. Folco, Breno H. Leitao
  • Patent number: 9378124
    Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.
    Type: Grant
    Filed: September 8, 2015
    Date of Patent: June 28, 2016
    Assignee: International Business Machines Corporation
    Inventors: Tiago N. dos Santos, Rafael C. S. Folco, Breno H. Leitao
  • Publication number: 20160162394
    Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.
    Type: Application
    Filed: December 5, 2014
    Publication date: June 9, 2016
    Inventors: Tiago N. dos Santos, Rafael C.S. Folco, Breno H. Leitao
  • Publication number: 20160162395
    Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.
    Type: Application
    Filed: September 8, 2015
    Publication date: June 9, 2016
    Inventors: Tiago N. dos Santos, Rafael C.S. Folco, Breno H. Leitao
  • Publication number: 20160139970
    Abstract: As disclosed herein a method, executed by a computer, for providing improved multi-protocol traffic processing includes receiving a data packet, determining if a big processor is activated, deactivating a little processor and activating the big processor if the big processor is not activated and an overflow queue is full, and deactivating the big processor and activating the little processor if the big processor is activated and a current throughput for the big processor is below a first threshold or a sustained throughput for the big processor remains below a second threshold. The big and little processors may be co-located on a single integrated circuit. An overflow queue, managed with a token bucket algorithm, may be used to enable the little processor to handle short burst of data packet traffic. A computer program product and an apparatus corresponding to the described method are also disclosed herein.
    Type: Application
    Filed: December 11, 2014
    Publication date: May 19, 2016
    Inventors: Murilo O. Araujo, Leonardo R. Augusto, Rafael C. S. Folco, Breno H. Leitao, Tiago N. Santos
  • Publication number: 20160140070
    Abstract: As disclosed herein a method, executed by a computer, for providing improved multi-protocol traffic processing includes receiving a data packet, determining if a big processor is activated, deactivating a little processor and activating the big processor if the big processor is not activated and an overflow queue is full, and deactivating the big processor and activating the little processor if the big processor is activated and a current throughput for the big processor is below a first threshold or a sustained throughput for the big processor remains below a second threshold. The big and little processors may be co-located on a single integrated circuit. An overflow queue, managed with a token bucket algorithm, may be used to enable the little processor to handle short burst of data packet traffic. A computer program product and an apparatus corresponding to the described method are also disclosed herein.
    Type: Application
    Filed: November 19, 2014
    Publication date: May 19, 2016
    Inventors: Murilo O. Araujo, Leonardo R. Augusto, Rafael C. S. Folco, Breno H. Leitao, Tiago N. Santos
  • Publication number: 20160139963
    Abstract: As disclosed herein, a method, executed by a computer, includes comparing a current power consumption profile for a computing task with an historical power consumption profile, receiving a request for a computing resource, granting the request if the historical power consumption profile does not suggest a pending peak in the current power consumption profile or the historical power consumption profile indicates persistent consumption at a higher power level, and denying the request for the computing resource if the historical power consumption profile suggests a pending peak in the current power consumption profile and the historical power consumption profile indicates temporary consumption at the higher power level. Denying the request may include initiating an allocation timeout and subsequently ending the allocation timeout in response to a drop in a power consumption below a selected level. A computer system and computer program product corresponding to the method are also disclosed herein.
    Type: Application
    Filed: November 19, 2014
    Publication date: May 19, 2016
    Inventors: Rafael C. S. Folco, Breno H. Leitao, Thiago C. Rotta, Tiago N. Santos
  • Publication number: 20160040470
    Abstract: Managing an entryway for a building includes a computer system accessing identity data providing unique biometric identifications and associated names for respective people. Roles are stored and associated with people. Rules are stored and configured to define roles or people and define conditions and actions. A certain rule includes presence of a person at an entryway and a person in at a different location than the entryway as a condition. A named person is identified by the computer system comparing identity data to biometric data received for a person at the entryway. The computer system performs a defined action for the certain rule responsive to determining that the certain rule defines a role associated with the identified, named person at the entryway and responsive to detecting by a sensor in the building that a person is present in the building at a different location than the entryway.
    Type: Application
    Filed: October 21, 2015
    Publication date: February 11, 2016
    Inventors: Rodrigo C. Castro, Breno H. Leitão, Mahdad Majd, Thiago C. Rotta
  • Publication number: 20150365286
    Abstract: Operating a dual chipset network interface controller (‘NIC’) that includes a high performance media access control chipset and a low performance media access control chipset, including: determining, by a NIC control module, an amount of network traffic being processed by the NIC; determining, by the NIC control module, whether the amount of network traffic being processed by the NIC exceeds a predetermined threshold; responsive to determining that the amount of network traffic being processed by the NIC exceeds a predetermined threshold, configuring, by the NIC control module, the NIC to utilize the high performance media access control chipset for data communications operations; and responsive to determining that the amount of network traffic being processed by the NIC does not exceed the predetermined threshold, configuring, by the NIC control module, the NIC to utilize the low performance media access control chipset for data communications operations.
    Type: Application
    Filed: August 25, 2015
    Publication date: December 17, 2015
    Applicant: International Business Machines Corporation
    Inventors: Rafael C. FOLCO, Breno H. LEITÃO, Tiago N. SANTOS
  • Patent number: 9196103
    Abstract: A computer system accesses identity data providing unique biometric identifications and associated names for respective people. Roles are stored and associating ones of the roles are associated with ones of the people. Rules are stored, wherein each rule is configured to define one of the roles or people and define a condition and an action. The computer system receives from a device at an entryway, biometric data for a person. A named person is indicated for the received biometric data by the identity data accessed by the computer system. The computer system selects a rule corresponding to the identified person or to one of the defined roles for the identified person. The computer system performs the defined action for the selected rule when a current condition satisfies the defined condition for the selected rule.
    Type: Grant
    Filed: January 30, 2013
    Date of Patent: November 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Rodrigo C. Castro, Breno H. Leitão, Mahdad Majd, Thiago C. Rotta
  • Patent number: 9170976
    Abstract: A mechanism is provided for resource management. A first network interface card in a set of network interface cards receives network data from one or more servers in a set of servers. Responsive to the first network interface card determining that a first threshold has been met indicating that an overload condition is imminent in the first network interface card, the first network interface card sends a resume signal to a second network interface card in the set of network interface cards. Responsive to the first network interface card determining that a second threshold is being met indicating that the overload condition has been met in the first network interface card, the first network interface card delegates the network data that caused the overload condition to be met to the second interface card.
    Type: Grant
    Filed: January 3, 2013
    Date of Patent: October 27, 2015
    Assignee: International Business Machines Corporation
    Inventors: Rafael C. S. Folco, Breno H. Leitao, Tiago N. D. Santos
  • Publication number: 20150154141
    Abstract: Operating a dual chipset network interface controller (‘NIC’) that includes a high performance media access control chipset and a low performance media access control chipset, including: determining, by a NIC control module, an amount of network traffic being processed by the NIC; determining, by the NIC control module, whether the amount of network traffic being processed by the NIC exceeds a predetermined threshold; responsive to determining that the amount of network traffic being processed by the NIC exceeds a predetermined threshold, configuring, by the NIC control module, the NIC to utilize the high performance media access control chipset for data communications operations; and responsive to determining that the amount of network traffic being processed by the NIC does not exceed the predetermined threshold, configuring, by the NIC control module, the NIC to utilize the low performance media access control chipset for data communications operations.
    Type: Application
    Filed: December 4, 2013
    Publication date: June 4, 2015
    Applicant: International Business Machines Corporation
    Inventors: Rafael C. Folco, Breno H. Leitão, Tiago N. Santos
  • Publication number: 20140373010
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for resource management for virtual machines. A computer receives information associated with one or more virtual machines, wherein the received information includes utilization information and workload information associated with each virtual machine of the one or more virtual machines. The computer analyzes the received information associated with the one or more virtual machines. The computer determines virtual machines for resource reallocation, wherein the determined virtual machines include one or more over-utilized virtual machines including at least one over-utilized resource. In another embodiment, the computer determines one or more under-utilized virtual machines, wherein the one or more under-utilized virtual machines include at least one under-utilized resource that corresponds to the determined one or more over-utilized resources.
    Type: Application
    Filed: June 14, 2013
    Publication date: December 18, 2014
    Inventors: Rafael C.S. Folco, Breno H. Leitao, Tiago N. dos Santos
  • Publication number: 20140340405
    Abstract: The geographical distribution of “crowdable” objects (for example, people with cell phones) is predicted in the form of a pixelated predictive map. The predictive map is based upon an optical flow algorithm, as applied to two, or more, pixelated crowdable object distribution maps, respectively representing distribution at different points in time.
    Type: Application
    Filed: May 15, 2013
    Publication date: November 20, 2014
    Applicant: International Business Machines Corporation
    Inventors: Tiago N. dos Santos, Rafael C. S. Folco, Breno H. Leitao
  • Publication number: 20140210590
    Abstract: A computer system accesses identity data providing unique biometric identifications and associated names for respective people. Roles are stored and associating ones of the roles are associated with ones of the people. Rules are stored, wherein each rule is configured to define one of the roles or people and define a condition and an action. The computer system receives from a device at an entryway, biometric data for a person. A named person is indicated for the received biometric data by the identity data accessed by the computer system. The computer system selects a rule corresponding to the identified person or to one of the defined roles for the identified person. The computer system performs the defined action for the selected rule when a current condition satisfies the defined condition for the selected rule.
    Type: Application
    Filed: January 30, 2013
    Publication date: July 31, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rodrigo C. Castro, Breno H. Leitão, Mahdad Majd, Thiago C. Rotta
  • Publication number: 20140189173
    Abstract: A mechanism is provided for resource management. A first network interface card in a set of network interface cards receives network data from one or more servers in a set of servers. Responsive to the first network interface card determining that a first threshold has been met indicating that an overload condition is imminent in the first network interface card, the first network interface card sends a resume signal to a second network interface card in the set of network interface cards. Responsive to the first network interface card determining that a second threshold is being met indicating that the overload condition has been met in the first network interface card, the first network interface card delegates the network data that caused the overload condition to be met to the second interface card.
    Type: Application
    Filed: January 3, 2013
    Publication date: July 3, 2014
    Applicant: International Business Machines Corporation
    Inventors: Rafael C. S. Folco, Breno H. Leitao, Tiago N. D. Santos