Patents by Inventor Eduardo T. Kahan

Eduardo T. Kahan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8086436
    Abstract: A deployment activity model is automatically generated from a deployment topology model. The operations to automatically generate the deployment activity model may be visible or “under the covers.” Regardless of visibility, a deployment model tool traverses a representation (e.g., one or more data structures) of the one or more diagrams of the deployment topology model. The deployment model tool begins creating preliminary representations of a deployment activity model until representation of a valid deployment activity model is created. Although the preliminary representations (assuming the first traversal attempt of the deployment topology model is unsuccessful) are discarded in some embodiments, other embodiments store the representations of the preliminary representations for analysis (e.g., analysis for the tool to learn, analysis to discover values for automatically defining attributes, etc.).
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: December 27, 2011
    Assignee: International Business Machines Corporation
    Inventors: Raphael P. Chancey, Eduardo T. Kahan
  • Patent number: 8056127
    Abstract: Embodiments of the invention include a method that comprises receiving and storing a power-on password. Embodiments of the invention include a method that comprises receiving and storing a power-on password. In one embodiment, the method includes receiving a power-on password, wherein the receiving of the power-on password occurs during power-on operations of a computer. The method can also include storing the power-on password, wherein the storing includes saving the power-on password in memory. The method can also include loading an operating system to control the computer, wherein the loading occurs after the power-on operations. The method can also include detecting, after the loading, that a peripheral devices has been added to the computer and determining that an access password is needed to access the peripheral device. The method can also include transmitting the power-on password to the peripheral device and presenting a prompt requesting a secondary password; receiving the secondary password.
    Type: Grant
    Filed: October 31, 2007
    Date of Patent: November 8, 2011
    Assignee: International Business Machines Corporation
    Inventors: Raphael P. Chancey, Eduardo T. Kahan
  • Patent number: 8046771
    Abstract: A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action would violate any constraint in the set.
    Type: Grant
    Filed: September 12, 2007
    Date of Patent: October 25, 2011
    Assignee: International Business Machines Corporation
    Inventors: Raphael P. Chancey, Lei He, Eduardo T. Kahan
  • Patent number: 7970778
    Abstract: Projects often involve multiple teams of developers in different locations. The different teams make updates to a central or shared database(s) that can store information about the project, such as progress. Each team or even different members of the different teams can check out instances of a representation of a model for the project. The different teams/members can independently modify their instance with data specific to that member and/or team. Database operations embedded in the individual instances are then executed on the database(s) to persist the data from their individual instances to the database(s). Database mechanisms can handle locking and/or conflicts that may arise from performance of the database operations. A manager can then request a report from the database(s), and the report with data from the different members and/or teams can be generated from the database(s).
    Type: Grant
    Filed: January 14, 2008
    Date of Patent: June 28, 2011
    Assignee: International Business Machines Corporation
    Inventors: Raphael P. Chancey, Eduardo T. Kahan
  • Publication number: 20110131249
    Abstract: A database of data can be leveraged to automatically generate profiles for use in modeling. The data may be specific to one or more domains and/or general to multiple domains. A mapping scheme is established to map structure of the database to a structure of a profile. The mapping scheme is read and the database is read in accordance with the mapping scheme to automatically generate one or more profiles.
    Type: Application
    Filed: January 31, 2011
    Publication date: June 2, 2011
    Applicant: International Business Machines Corporation
    Inventors: Raphael P. Chancey, Lei He, Eduardo T. Kahan
  • Patent number: 7930203
    Abstract: A system for providing integrated system solutions includes a set of process descriptions; a set of work product descriptions; and engagement models collecting the process descriptions and work product descriptions into a models for implementing typical projects addressing marketplace requirements. A systems integration method includes the steps of defining an engagement model which will be used to address a market place requirement; utilizing the engagement model to create an engagement template which specifically addresses client requirements within the market place; and measuring, monitoring and controlling client engagements based upon the engagement model.
    Type: Grant
    Filed: August 4, 2005
    Date of Patent: April 19, 2011
    Assignee: International Business Machines Corporation
    Inventors: Steven D. Barnes, John R. Cameron, David M. Gerber, Eduardo T. Kahan, Jon M. Boring, Christopher A. Newlon
  • Publication number: 20110082721
    Abstract: A computer implemented method, data processing system, and computer usable program code for managing reactive business processes. In one embodiment, the computer implemented method provides for modeling a set of business processes as pre-defined events in a software process application, wherein the software process application is located on a data processing system. A set of performance indicators are associated to the set of business processes. A set of reactive business processes are modeled, wherein the set of reactive business processes are pre-defined templates included in the software process application. The set of reactive business processes are mapped to the set of performance indicators. The set of performance indicators are monitored and responsive to a trigger from the set of performance indicators, a reactive business process is initiated.
    Type: Application
    Filed: October 2, 2009
    Publication date: April 7, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Majeed M. Arni, Peter A. Coldicott, Eduardo T. Kahan, Mei Y. Selvage
  • Patent number: 7912870
    Abstract: A database of data can be leveraged to automatically generate profiles for use in modeling. The data may be specific to one or more domains and/or general to multiple domains. A mapping scheme is established to map structure of the database to a structure of a profile. The mapping scheme is read and the database is read in accordance with the mapping scheme to automatically generate one or more profiles.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: March 22, 2011
    Assignee: International Business Machines Corporation
    Inventors: Raphael P. Chancey, Lei He, Eduardo T. Kahan
  • Publication number: 20110054958
    Abstract: Provided is a method for the management of actionable assets with respect to a computing solution. Assets and corresponding artifacts are located and downloaded from a tool repository and incorporated into existing computing tooling. The repository may be located on any computing system connected to an appropriately configured host system via a network such as a local area network (LAN) or the Internet. Downloaded assets are analyzed and parsed into corresponding artifacts. The asset is disassembled into the corresponding artifacts and loaded into the computing tooling. The tooling is then reconfigured with respect to the newly loaded asset and artifacts. Reconfiguration may, but is not limited to, the reconfiguration of palettes, menus and auto model loading. Automatic reconfiguration of the tooling is also executed based upon the availability of the asset the asset type and classification of the asset.
    Type: Application
    Filed: August 25, 2009
    Publication date: March 3, 2011
    Applicant: International Business Machines Corporation
    Inventors: Raphael P. Chancey, Eduardo T. Kahan
  • Publication number: 20110022439
    Abstract: Embodiments of the invention are associated with a configuration comprising multiple integrated SOA governance components, and are generally concerned with monitoring and managing events that can or are likely to impact on different components of the configuration. One embodiment of the invention, directed to a method, comprises the steps of detecting a particular event that occurs at a particular SOA governance component of the configuration, and routing information pertaining to the detected event to a pre-specified storage location. The method further comprises operating a monitoring mechanism to selectively monitor the information routed to the location, and to determine from the monitored information that the particular event has occurred at the particular component of the configuration.
    Type: Application
    Filed: July 22, 2009
    Publication date: January 27, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Majeed M. Arni, Peter A. Coldicott, Eduardo T. Kahan, Mei Y. Selvage
  • Publication number: 20110010217
    Abstract: Embodiments of the invention are directed to establishing a governance procedure for a selected service oriented architecture. One embodiment of the invention, directed to a method, comprises the steps of furnishing one or more first governance tasks, and furnishing one or more second governance tasks. The method further comprises providing a user of the governance procedure with a template, wherein the template is configured for operation by the user to selectively modify at least one of the first governance tasks. The template is configured further to be incapable of modifying any of the second governance tasks, when the template is being operated by the user. Each modified first governance task is combined with each of the second governance tasks, and also with each unmodified first governance task, to provide the governance procedure.
    Type: Application
    Filed: July 13, 2009
    Publication date: January 13, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Majeed M. Arni, Peter A. Coldicott, Eduardo T. Kahan, Mei Y. Selvage
  • Publication number: 20100333083
    Abstract: A reusable asset packaging and consumption method and system that support consumption activities and variability point instances associated with asset types or artifact types. Generic consumption activities and variability point types for different asset types or artifact types and developed and stored in a repository. When an asset packager packages an asset, a needed activity is selected from the activities associated with the type of the asset. The activity, a variability point instance bound with the activity, and the context constraints, together with the artifacts is packaged into the asset package, where the asset package is then stored in a repository. During consumption, the asset consumer obtains the asset package, verifies the context, and executes the activity packaged in the asset, while specifying variability point values for the bound variability instance.
    Type: Application
    Filed: June 30, 2010
    Publication date: December 30, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Raphael P. Chancey, Lei He, Eduardo T. Kahan, Dong Bing Li, Chen Tian, Chang He Weng, Yong Zhao
  • Publication number: 20100250677
    Abstract: Real-time communication for resource content comprises selecting by a subscriber device, an event topic based on an event topic list, creating for the selected event topic, a topic path for receiving a notification event related to the selected event topic, and sending path information of the created topic path as part of identification information with the selected event topic to a resource content publishing device. Real-time communication also comprises receiving by the resource content publishing device, the identification information and the selected event topic, and adding the identification information and the selected event topic to an event topic subscription search table.
    Type: Application
    Filed: March 26, 2010
    Publication date: September 30, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eduardo T. Kahan, Li Chuan Feng, Liang Xiao Xing, Yu Chen Zhou
  • Publication number: 20100058162
    Abstract: Manually changing properties of each diagram element placed in a drawing becomes tedious. A significant amount of time is spent manually customizing diagram elements creating or editing a drawing. Functionality can be implemented within a drawing application to allow automatic diagram element customization based on a set of diagram element policies. Diagram policies specify conditions for customizing properties of a diagram element. Automatic customization of diagram elements reduces time spent creating drawings because diagram elements will be placed in a drawing in their desired configurations.
    Type: Application
    Filed: August 27, 2008
    Publication date: March 4, 2010
    Applicant: International Business Machines Corporation
    Inventors: Peter A. Coldicott, Eduardo T. Kahan, Velayoudame P. Mouttcoucomarasamy
  • Publication number: 20100058161
    Abstract: Managing diagram elements in a drawing becomes more challenging as the number of diagram elements increases. Placing a new diagram element in a drawing often requires manual movement of one or more other diagram elements within the drawing. Functionality can be implemented within a drawing application to automatically manage diagram elements in a drawing by applying layouts to sets of diagram elements. A drawing tool can associate a set of diagram elements and assigns them a exclusive area or region in the drawing space. Since a layout occupies an exclusive area, the drawing tool can manage the drawing space by automatically moving elements within a first layout when overlap with a second layout is detected. Managing drawing spaces with layouts reduces time spent adjusting diagram elements as a result of applying operations to other elements.
    Type: Application
    Filed: August 27, 2008
    Publication date: March 4, 2010
    Applicant: International Business Machines Corporation
    Inventors: Peter A. Coldicott, Eduardo T. Kahan, Velayoudame P. Mouttoucomarasamy
  • Publication number: 20100053215
    Abstract: Users of drawing applications can utilize patterns to efficiently create diagrams as users tend to create similar drawings over time. For example, a user may create two use case diagrams. The first use case diagram depicts use cases for driving a car and the second use case diagram depicts use cases for driving a motorcycle. The use cases and structure of the diagrams are similar. Functionality may be implemented within a drawing application to determine a pattern from a drawing and create a new drawing based on the pattern. Creating a new drawing based on a pattern reduces time spent creating similar drawings because a user is able to edit the new pattern based drawing instead of creating the new drawing from scratch.
    Type: Application
    Filed: August 27, 2008
    Publication date: March 4, 2010
    Applicant: International Business Machines Corporation
    Inventors: Peter A. Coldicott, Eduardo T. Kahan, Velayoudame P. Mouttoucomarasamy
  • Publication number: 20090210384
    Abstract: A visualization tool that provides visibility of the functionality implemented with each system used by an institution(s) at code unit granularity can be used to overcome a variety of challenges that can occur in an environment with disparate systems. The visualization tool discovers and graphically displays functions/procedures/methods (“code units”) that satisfy a set of one or more criteria, as well as attributes of the discovered code units. Furthermore, the visualization tool can automatically provide visual annotations to identify targets for asset maintenance, targets to leverage for other systems, etc.
    Type: Application
    Filed: February 19, 2008
    Publication date: August 20, 2009
    Applicant: International Business Machines Corporation
    Inventors: Raphael P. Chancey, Lei Chen, Eduardo T. Kahan
  • Publication number: 20090182752
    Abstract: Projects often involve multiple teams of developers in different locations. The different teams make updates to a central or shared database(s) that can store information about the project, such as progress. Each team or even different members of the different teams can check out instances of a representation of a model for the project. The different teams/members can independently modify their instance with data specific to that member and/or team. Database operations embedded in the individual instances are then executed on the database(s) to persist the data from their individual instances to the database(s). Database mechanisms can handle locking and/or conflicts that may arise from performance of the database operations. A manager can then request a report from the database(s), and the report with data from the different members and/or teams can be generated from the database(s).
    Type: Application
    Filed: January 14, 2008
    Publication date: July 16, 2009
    Applicant: International Business Machines Corporation
    Inventors: Raphael P. Chancey, Eduardo T. Kahan
  • Publication number: 20090119225
    Abstract: A computer-implementable method, system and computer-usable medium in which a unified model is utilized to provide candidate service assets. A plurality of assets can be presented to a user in association with a consistent set of properties that demonstrate how a particular asset among the assets Is composed. A single consolidated data model can then be processed that sufficiently describes the particular asset in a manner that provides sufficient information to the user to determine if the particular asset is a possible candidate for subsequent selection and action by the user, thereby permitting the user to perform decisions with respect to the particular asset with a minimal effort.
    Type: Application
    Filed: November 5, 2007
    Publication date: May 7, 2009
    Inventors: RAPHAEL P. CHANCEY, Eduardo T. Kahan
  • Publication number: 20090113544
    Abstract: Embodiments of the invention include a method that comprises receiving and storing a power-on password. Embodiments of the invention include a method that comprises receiving and storing a power-on password. In one embodiment, the method includes receiving a power-on password, wherein the receiving of the power-on password occurs during power-on operations of a computer. The method can also include storing the power-on password, wherein the storing includes saving the power-on password in memory. The method can also include loading an operating system to control the computer, wherein the loading occurs after the power-on operations. The method can also include detecting, after the loading, that a peripheral devices has been added to the computer and determining that an access password is needed to access the peripheral device. The method can also include transmitting the power-on password to the peripheral device and presenting a prompt requesting a secondary password; receiving the secondary password.
    Type: Application
    Filed: October 31, 2007
    Publication date: April 30, 2009
    Applicant: International Business Machines Corporation
    Inventors: Raphael P. Chancey, Eduardo T. Kahan