Patents by Inventor Breno H. Leitao
Breno H. Leitao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170104718Abstract: A first computing system may identify a security threat located at least at a first virtual server. The first virtual server may be within a second computing system. The first computing system may provision, in response to the identifying, a first firewall associated with the first virtual server. The first firewall may include a rule to deny all communication transmitted from the first virtual server. The first computing system may execute, in response to the provisioning, a first repair operation to repair the first virtual server.Type: ApplicationFiled: October 9, 2015Publication date: April 13, 2017Inventors: Rafael C. S. Folco, Plinio A. S. Freire, Breno H. Leitao, Tiago N. d. Santos
-
Publication number: 20170104782Abstract: A first computing system may identify a security threat located at least at a first virtual server. The first virtual server may be within a second computing system. The first computing system may provision, in response to the identifying, a first firewall associated with the first virtual server. The first firewall may include a rule to deny all communication transmitted from the first virtual server. The first computing system may execute, in response to the provisioning, a first repair operation to repair the first virtual server.Type: ApplicationFiled: October 22, 2015Publication date: April 13, 2017Inventors: Rafael C. S. Folco, Plinio A. S. Freire, Breno H. Leitao, Tiago N. d. Santos
-
Publication number: 20160232079Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.Type: ApplicationFiled: April 19, 2016Publication date: August 11, 2016Inventors: Tiago N. dos Santos, Rafael C.S. Folco, Breno H. Leitao
-
Patent number: 9396100Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.Type: GrantFiled: December 5, 2014Date of Patent: July 19, 2016Assignee: International Business Machines CorporationInventors: Tiago N. dos Santos, Rafael C. S. Folco, Breno H. Leitao
-
Patent number: 9378124Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.Type: GrantFiled: September 8, 2015Date of Patent: June 28, 2016Assignee: International Business Machines CorporationInventors: Tiago N. dos Santos, Rafael C. S. Folco, Breno H. Leitao
-
Publication number: 20160162394Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.Type: ApplicationFiled: December 5, 2014Publication date: June 9, 2016Inventors: Tiago N. dos Santos, Rafael C.S. Folco, Breno H. Leitao
-
Publication number: 20160162395Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.Type: ApplicationFiled: September 8, 2015Publication date: June 9, 2016Inventors: Tiago N. dos Santos, Rafael C.S. Folco, Breno H. Leitao
-
Publication number: 20160139970Abstract: As disclosed herein a method, executed by a computer, for providing improved multi-protocol traffic processing includes receiving a data packet, determining if a big processor is activated, deactivating a little processor and activating the big processor if the big processor is not activated and an overflow queue is full, and deactivating the big processor and activating the little processor if the big processor is activated and a current throughput for the big processor is below a first threshold or a sustained throughput for the big processor remains below a second threshold. The big and little processors may be co-located on a single integrated circuit. An overflow queue, managed with a token bucket algorithm, may be used to enable the little processor to handle short burst of data packet traffic. A computer program product and an apparatus corresponding to the described method are also disclosed herein.Type: ApplicationFiled: December 11, 2014Publication date: May 19, 2016Inventors: Murilo O. Araujo, Leonardo R. Augusto, Rafael C. S. Folco, Breno H. Leitao, Tiago N. Santos
-
Publication number: 20160140070Abstract: As disclosed herein a method, executed by a computer, for providing improved multi-protocol traffic processing includes receiving a data packet, determining if a big processor is activated, deactivating a little processor and activating the big processor if the big processor is not activated and an overflow queue is full, and deactivating the big processor and activating the little processor if the big processor is activated and a current throughput for the big processor is below a first threshold or a sustained throughput for the big processor remains below a second threshold. The big and little processors may be co-located on a single integrated circuit. An overflow queue, managed with a token bucket algorithm, may be used to enable the little processor to handle short burst of data packet traffic. A computer program product and an apparatus corresponding to the described method are also disclosed herein.Type: ApplicationFiled: November 19, 2014Publication date: May 19, 2016Inventors: Murilo O. Araujo, Leonardo R. Augusto, Rafael C. S. Folco, Breno H. Leitao, Tiago N. Santos
-
Publication number: 20160139963Abstract: As disclosed herein, a method, executed by a computer, includes comparing a current power consumption profile for a computing task with an historical power consumption profile, receiving a request for a computing resource, granting the request if the historical power consumption profile does not suggest a pending peak in the current power consumption profile or the historical power consumption profile indicates persistent consumption at a higher power level, and denying the request for the computing resource if the historical power consumption profile suggests a pending peak in the current power consumption profile and the historical power consumption profile indicates temporary consumption at the higher power level. Denying the request may include initiating an allocation timeout and subsequently ending the allocation timeout in response to a drop in a power consumption below a selected level. A computer system and computer program product corresponding to the method are also disclosed herein.Type: ApplicationFiled: November 19, 2014Publication date: May 19, 2016Inventors: Rafael C. S. Folco, Breno H. Leitao, Thiago C. Rotta, Tiago N. Santos
-
Publication number: 20160040470Abstract: Managing an entryway for a building includes a computer system accessing identity data providing unique biometric identifications and associated names for respective people. Roles are stored and associated with people. Rules are stored and configured to define roles or people and define conditions and actions. A certain rule includes presence of a person at an entryway and a person in at a different location than the entryway as a condition. A named person is identified by the computer system comparing identity data to biometric data received for a person at the entryway. The computer system performs a defined action for the certain rule responsive to determining that the certain rule defines a role associated with the identified, named person at the entryway and responsive to detecting by a sensor in the building that a person is present in the building at a different location than the entryway.Type: ApplicationFiled: October 21, 2015Publication date: February 11, 2016Inventors: Rodrigo C. Castro, Breno H. Leitão, Mahdad Majd, Thiago C. Rotta
-
Publication number: 20150365286Abstract: Operating a dual chipset network interface controller (‘NIC’) that includes a high performance media access control chipset and a low performance media access control chipset, including: determining, by a NIC control module, an amount of network traffic being processed by the NIC; determining, by the NIC control module, whether the amount of network traffic being processed by the NIC exceeds a predetermined threshold; responsive to determining that the amount of network traffic being processed by the NIC exceeds a predetermined threshold, configuring, by the NIC control module, the NIC to utilize the high performance media access control chipset for data communications operations; and responsive to determining that the amount of network traffic being processed by the NIC does not exceed the predetermined threshold, configuring, by the NIC control module, the NIC to utilize the low performance media access control chipset for data communications operations.Type: ApplicationFiled: August 25, 2015Publication date: December 17, 2015Applicant: International Business Machines CorporationInventors: Rafael C. FOLCO, Breno H. LEITÃO, Tiago N. SANTOS
-
Patent number: 9196103Abstract: A computer system accesses identity data providing unique biometric identifications and associated names for respective people. Roles are stored and associating ones of the roles are associated with ones of the people. Rules are stored, wherein each rule is configured to define one of the roles or people and define a condition and an action. The computer system receives from a device at an entryway, biometric data for a person. A named person is indicated for the received biometric data by the identity data accessed by the computer system. The computer system selects a rule corresponding to the identified person or to one of the defined roles for the identified person. The computer system performs the defined action for the selected rule when a current condition satisfies the defined condition for the selected rule.Type: GrantFiled: January 30, 2013Date of Patent: November 24, 2015Assignee: International Business Machines CorporationInventors: Rodrigo C. Castro, Breno H. Leitão, Mahdad Majd, Thiago C. Rotta
-
Patent number: 9170976Abstract: A mechanism is provided for resource management. A first network interface card in a set of network interface cards receives network data from one or more servers in a set of servers. Responsive to the first network interface card determining that a first threshold has been met indicating that an overload condition is imminent in the first network interface card, the first network interface card sends a resume signal to a second network interface card in the set of network interface cards. Responsive to the first network interface card determining that a second threshold is being met indicating that the overload condition has been met in the first network interface card, the first network interface card delegates the network data that caused the overload condition to be met to the second interface card.Type: GrantFiled: January 3, 2013Date of Patent: October 27, 2015Assignee: International Business Machines CorporationInventors: Rafael C. S. Folco, Breno H. Leitao, Tiago N. D. Santos
-
Publication number: 20150154141Abstract: Operating a dual chipset network interface controller (‘NIC’) that includes a high performance media access control chipset and a low performance media access control chipset, including: determining, by a NIC control module, an amount of network traffic being processed by the NIC; determining, by the NIC control module, whether the amount of network traffic being processed by the NIC exceeds a predetermined threshold; responsive to determining that the amount of network traffic being processed by the NIC exceeds a predetermined threshold, configuring, by the NIC control module, the NIC to utilize the high performance media access control chipset for data communications operations; and responsive to determining that the amount of network traffic being processed by the NIC does not exceed the predetermined threshold, configuring, by the NIC control module, the NIC to utilize the low performance media access control chipset for data communications operations.Type: ApplicationFiled: December 4, 2013Publication date: June 4, 2015Applicant: International Business Machines CorporationInventors: Rafael C. Folco, Breno H. Leitão, Tiago N. Santos
-
Publication number: 20140373010Abstract: Embodiments of the present invention disclose a method, computer program product, and system for resource management for virtual machines. A computer receives information associated with one or more virtual machines, wherein the received information includes utilization information and workload information associated with each virtual machine of the one or more virtual machines. The computer analyzes the received information associated with the one or more virtual machines. The computer determines virtual machines for resource reallocation, wherein the determined virtual machines include one or more over-utilized virtual machines including at least one over-utilized resource. In another embodiment, the computer determines one or more under-utilized virtual machines, wherein the one or more under-utilized virtual machines include at least one under-utilized resource that corresponds to the determined one or more over-utilized resources.Type: ApplicationFiled: June 14, 2013Publication date: December 18, 2014Inventors: Rafael C.S. Folco, Breno H. Leitao, Tiago N. dos Santos
-
Publication number: 20140340405Abstract: The geographical distribution of “crowdable” objects (for example, people with cell phones) is predicted in the form of a pixelated predictive map. The predictive map is based upon an optical flow algorithm, as applied to two, or more, pixelated crowdable object distribution maps, respectively representing distribution at different points in time.Type: ApplicationFiled: May 15, 2013Publication date: November 20, 2014Applicant: International Business Machines CorporationInventors: Tiago N. dos Santos, Rafael C. S. Folco, Breno H. Leitao
-
Publication number: 20140210590Abstract: A computer system accesses identity data providing unique biometric identifications and associated names for respective people. Roles are stored and associating ones of the roles are associated with ones of the people. Rules are stored, wherein each rule is configured to define one of the roles or people and define a condition and an action. The computer system receives from a device at an entryway, biometric data for a person. A named person is indicated for the received biometric data by the identity data accessed by the computer system. The computer system selects a rule corresponding to the identified person or to one of the defined roles for the identified person. The computer system performs the defined action for the selected rule when a current condition satisfies the defined condition for the selected rule.Type: ApplicationFiled: January 30, 2013Publication date: July 31, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rodrigo C. Castro, Breno H. Leitão, Mahdad Majd, Thiago C. Rotta
-
Publication number: 20140189173Abstract: A mechanism is provided for resource management. A first network interface card in a set of network interface cards receives network data from one or more servers in a set of servers. Responsive to the first network interface card determining that a first threshold has been met indicating that an overload condition is imminent in the first network interface card, the first network interface card sends a resume signal to a second network interface card in the set of network interface cards. Responsive to the first network interface card determining that a second threshold is being met indicating that the overload condition has been met in the first network interface card, the first network interface card delegates the network data that caused the overload condition to be met to the second interface card.Type: ApplicationFiled: January 3, 2013Publication date: July 3, 2014Applicant: International Business Machines CorporationInventors: Rafael C. S. Folco, Breno H. Leitao, Tiago N. D. Santos