Patents by Inventor Constantin M. Adam

Constantin M. Adam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170177878
    Abstract: A computer-implemented agent process running on a first computer automatically intercepts a command issued from the first computer to execute on a target computer prior to invocation of the command on the target computer. A server profile built for an application running on the target computer that supports the command may be retrieved. At least based on the server profile a risk enforcement policy is dynamically constructed. Based on the risk enforcement policy, one or more computer-executable enforcement actions to perform prior to sending the command to the target computer for execution is determined. Based on executing of one or more of the computer-executable enforcement actions, the command may be transmitted to execute on the target computer or prevented from executing on the target computer.
    Type: Application
    Filed: December 7, 2016
    Publication date: June 22, 2017
    Inventors: Constantin M. Adam, Nikolaos Anerousis, Vysakh K. Chandran, Milton H. Hernandez, Debasisha K. Padhi, Yaoping Ruan, Fabio M. Tanada, Frederick Y.-F. Wu, Sai Zeng
  • Publication number: 20170060886
    Abstract: Deleting files may include identifying files stored in a storage device to delete based on one or more deletion rules. The identified files are categorized into at least a first group and a second group. Deletion of files may be triggered based on a free space threshold. Deletion of files in the first group may be triggered. If the free space threshold is not met by deleting the files in the first group, deletion of files in the second group is triggered based on one or more of prioritization and cost optimization.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Inventors: Constantin M. Adam, John J. Rofrano, Shang Q. Guo, Frederick Y.-F. Wu, Sai Zeng
  • Patent number: 9584378
    Abstract: A computer-implemented agent process running on a first computer automatically intercepts a command issued from the first computer to execute on a target computer prior to invocation of the command on the target computer. A server profile built for an application running on the target computer that supports the command may be retrieved. At least based on the server profile a risk enforcement policy is dynamically constructed. Based on the risk enforcement policy, one or more computer-executable enforcement actions to perform prior to sending the command to the target computer for execution is determined. Based on executing of one or more of the computer-executable enforcement actions, the command may be transmitted to execute on the target computer or prevented from executing on the target computer.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: February 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Constantin M Adam, Nikolaos Anerousis, Vysakh K. Chandran, Milton H. Hernandez, Debasisha K. Padhi, Yaoping Ruan, Fabio M. Tanada, Frederick Y.-F. Wu, Sai Zeng
  • Publication number: 20170054598
    Abstract: A method is provided to eliminate many of the manual steps in a server change management process, creating a self-service experience for a change requester. The method may automatically retrieve the current state of a server; constrain the requested change to a valid, feasible specification; verify that the requested change is compliant with business policies; implement the changes automatically; and develop a knowledge base of automated change risk that is used to modify the change management business process by identifying safe changes that can be performed outside of change windows and/or during change freezes. The method can be applied to changes to physical servers, virtual servers, and servers in a cloud environment.
    Type: Application
    Filed: August 20, 2015
    Publication date: February 23, 2017
    Inventors: Constantin M. Adam, Shang Q. Guo, Brian L. Peterson, John J. Rofrano, Frederick Y. Wu, Sai Zeng
  • Publication number: 20160328670
    Abstract: A method for predicting effects of climate change on supply chain performance includes receiving a global climate change model, a supply chain model, and at least one element model. A regional climate model modeling local weather is generated using the global climate model. A first supply chain performance is simulated using the supply chain model, the element model and the regional climate model. One or more extreme weather events are forecasted using the regional climate model. A second supply chain performance is simulated using the supply chain model and the forecasted extreme weather events. A score is determined for the supply chain performance.
    Type: Application
    Filed: May 4, 2015
    Publication date: November 10, 2016
    Inventors: CONSTANTIN M. ADAM, SHANG Q GUO, JOHN J. ROFRANO, LLOYD A. TREINISH, MAJA VUKOVIC, FREDERICK WU, SAl ZENG
  • Publication number: 20160241397
    Abstract: A method forms a key pair for a user. The key pair has a public key and a private key that is unique to the user and that is encrypted using a passphrase formed from an enterprise password of the user and an identification that uniquely identifies in the enterprise a device by which the user gains access. The method stores the private key in the user device and stores the public key in an enterprise server that is accessed by the user. The method provides the private key from the user device to a client, such as a SSH client, in conjunction with the password and the identification, decrypts the private key to obtain the decrypted password and the identification, and allows the user to access the enterprise server only if the decrypted password and the identification match the password and the identification provided with the private key.
    Type: Application
    Filed: June 22, 2015
    Publication date: August 18, 2016
    Inventors: Constantin M. Adam, Milton H. Hernandez, Vugranam C. Sreedhar, Prema Vivekanandan
  • Publication number: 20160241558
    Abstract: A method forms a key pair for a user. The key pair has a public key and a private key that is unique to the user and that is encrypted using a passphrase formed from an enterprise password of the user and an identification that uniquely identifies in the enterprise a device by which the user gains access. The method stores the private key in the user device and stores the public key in an enterprise server that is accessed by the user. The method provides the private key from the user device to a client, such as a SSH client, in conjunction with the password and the identification, decrypts the private key to obtain the decrypted password and the identification, and allows the user to access the enterprise server only if the decrypted password and the identification match the password and the identification provided with the private key.
    Type: Application
    Filed: February 13, 2015
    Publication date: August 18, 2016
    Inventors: Constantin M. Adam, Milton H. Hernandez, Vugranam C. Sreedhar, Prema Vivekanandan
  • Publication number: 20160048685
    Abstract: On a computer system, a shell is invoked, through which a plurality of commands and/or scripts can be executed. Individual ones of the plurality of commands and/or scripts are validated. Given individual ones of the plurality of commands and/or scripts, for which the validation is successful, are executed via the shell.
    Type: Application
    Filed: August 18, 2014
    Publication date: February 18, 2016
    Inventors: Constantin M. Adam, Shang Q. Guo, John J. Rofrano, Yaoping Ruan, Frederick Y. Wu, Sai Zeng
  • Publication number: 20160036817
    Abstract: Methods, systems, and computer program products for a protected graphical user interface for role-based application and data access are provided herein. A method for controlling access on an endpoint device to at least a portion of an application includes obtaining a default configuration indicating whether one or more widget functions associated with the application are enabled in a graphical user interface; modifying one or more of the widget functions in the default configuration to a disabled status in the graphical user interface based on a privilege configuration; determining if one or more user click events generated using the graphical user interface are associated with a widget function having the disabled status; and preventing the user click events having the disabled status from being provided to an operating system for further processing, wherein at least one of the steps is carried out by a computing device.
    Type: Application
    Filed: July 31, 2014
    Publication date: February 4, 2016
    Inventors: Constantin M. Adam, Shang Q. Guo, John J. Rofrano, Yaoping Ruan, Frederick Yung-Fung Wu, Sai Zeng
  • Publication number: 20150200959
    Abstract: It is determined whether a user is authorized to carry out a management operation on a plurality of information technology assets in parallel, based on a role of the user and at least one characteristic of the management operation. A risk level of the management operation, and at least one characteristic of the plurality of information technology assets, are both determined. Based on the risk level and the at least one characteristic of the plurality of information technology assets, an execution pattern for the management operation is specified. In at least some cases, the management operation is carried out on the plurality of information technology assets in parallel, in accordance with the execution pattern.
    Type: Application
    Filed: September 30, 2014
    Publication date: July 16, 2015
    Inventors: Constantin M. Adam, Shang Q. Guo, Rajeev Puri, Yaoping Ruan, Cashchakanith Venugopal, Frederick Y. Wu, Sai Zeng
  • Patent number: 8332873
    Abstract: A method for determining an application instance placement in a set of machines under one or more resource constraints includes the following steps. An estimate is computed of a value of the first metric that can be achieved by a current application instance placement and a current application load distribution. A new application instance placement and a new application load distribution are determined, wherein the new application instance placement and the new load distribution optimize the first metric.
    Type: Grant
    Filed: June 10, 2008
    Date of Patent: December 11, 2012
    Assignee: International Business Machines Corporation
    Inventors: Constantin M. Adam, Michael Joseph Spreitzer, Malgorzata Steinder, Chunqiang Tang
  • Patent number: 8140681
    Abstract: A decentralized process to ensure the dynamic placement of applications on servers under two types of simultaneous resource requirements, those that are dependent on the loads placed on the applications and those that are independent. The demand (load) for applications changes over time and the goal is to satisfy all the demand while changing the solution (assignment of applications to servers) as little as possible.
    Type: Grant
    Filed: February 21, 2009
    Date of Patent: March 20, 2012
    Assignee: International Business Machines Corporation
    Inventors: Constantin M. Adam, Giovanni Pacifici, Michael J. Spreitzer, Malgorzata Steinder, Chunqiang Tang
  • Publication number: 20090157855
    Abstract: A decentralized process to ensure the dynamic placement of applications on servers under two types of simultaneous resource requirements, those that are dependent on the loads placed on the applications and those that are independent. The demand (load) for applications changes over time and the goal is to satisfy all the demand while changing the solution (assignment of applications to servers) as little as possible.
    Type: Application
    Filed: February 21, 2009
    Publication date: June 18, 2009
    Inventors: Constantin M. Adam, Giovanni Pacifici, Michael J. Spreitzer, Malgorzata Steinder, Chunqiang Tang
  • Patent number: 7496667
    Abstract: A decentralized process to ensure the dynamic placement of applications on servers under two types of simultaneous resource requirements, those that are dependent on the loads placed on the applications and those that are independent. The demand (load) for applications changes over time and the goal is to satisfy all the demand while changing the solution (assignment of applications to servers) as little as possible.
    Type: Grant
    Filed: January 31, 2006
    Date of Patent: February 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Constantin M. Adam, Giovanni Pacifici, Michael J. Spreitzer, Malgorzata Steinder, Chunqiang Tang
  • Publication number: 20080282267
    Abstract: Techniques are disclosed for determining placements of application instances on computing resources in a computing system such that the application instances can be executed thereon. By way of example, a method for determining an application instance placement in a set of machines under one or more resource constraints includes the following steps. An estimate is computed of a value of the first metric that can be achieved by a current application instance placement and a current application load distribution. A new application instance placement and a new application load distribution are determined, wherein the new application instance placement and the new load distribution optimize the first metric.
    Type: Application
    Filed: June 10, 2008
    Publication date: November 13, 2008
    Applicant: International Business Machines Corporation
    Inventors: Constantin M. Adam, Michael Joseph Spreitzer, Malgorzata Steinder, Chunqiang Tang
  • Publication number: 20070300239
    Abstract: Techniques are disclosed for determining placements of application instances on computing resources in a computing system such that the application instances can be executed thereon. By way of example, a method for determining an application instance placement in a set of machines under one or more resource constraints includes the following steps. An estimate is computed of a value of the first metric that can be achieved by a current application instance placement and a current application load distribution. A new application instance placement and a new application load distribution are determined, wherein the new application instance placement and the new load distribution optimize the first metric.
    Type: Application
    Filed: June 23, 2006
    Publication date: December 27, 2007
    Applicant: International Business Machines Corporation
    Inventors: Constantin M. Adam, Michael Joseph Spreitzer, Malgorzata Steinder, Chunqiang Tang