Patents by Inventor Kim Poh Wong
Kim Poh Wong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240061674Abstract: Application transition and transformation is provided by observing and analyzing execution of a monolithic application to provide properties of the data communication of the monolithic application, identifying, by an artificial intelligence engine, atomic application element(s) having logical functional block(s) that function independent of other atomic application element, determining, by the artificial intelligence engine, candidate atomic application element(s) for migrating out of the monolithic application and refactoring, based on automated testing and validation, refactoring at least one candidate atomic application element into a respective at least one refactored element, where the refactoring selects a platform technology for the refactored element and implements functionality of the candidate atomic application element as the refactored element of the selected platform technology, and providing the at least one refactored element to system(s) for execution thereon.Type: ApplicationFiled: August 22, 2022Publication date: February 22, 2024Inventors: Clea ZOLOTOW, Susheel GOOLY, Rudolph C. BARON, JR., Kim Poh WONG, Marci D. FORMATO, Tedrick N. Northway
-
Patent number: 11650954Abstract: A processor determines the data to be replicated in the production site. The processor splits the data into a plurality of blocks. The processor determines one or more replication links. The processor determines an order of each one of the plurality of blocks to be sent over the one or more replication links, where the order of each one of the plurality of blocks to be sent over the one or more replication links is determined by a machine learning model.Type: GrantFiled: November 13, 2020Date of Patent: May 16, 2023Assignee: KYNDRYL, INC.Inventors: Kim Poh Wong, Young Soo Basler
-
Publication number: 20230138727Abstract: An approach is provided for determining a carbon footprint-based consumption of cloud resources. Cloud resource requirements and a carbon footprint cap of a workload of a cloud consumer are received. The requirements and cap are based on a sustainability target, published by the cloud consumer, and subscribed by cloud service providers. A list of cloud resources that satisfy the requirements are sent. Carbon emission values of the cloud resources at different load levels of the workload are sent. Based on a service level agreement requirement, a criticality level, and a peak load duration of the workload, and previous success rates of satisfying cloud resource requirements by cloud service providers, an optimized configuration of cloud resource(s) and cloud service provider(s) is selected. The cloud resource(s) are selected from the list and have a carbon footprint that does not exceed the cap at a given load level.Type: ApplicationFiled: October 29, 2021Publication date: May 4, 2023Inventors: Kim Poh Wong, Firas Bouz, Seema Nagar, Pramod Vadayadiyil Raveendran
-
Patent number: 11546354Abstract: A method includes: determining, by a computer device, affinities between components in a networked computer system; determining, by the computer device, a risk level of each of the components; determining, by the computer device, a risk level of the networked computer system; detecting, by the computer device, a threat in the networked computer system; determining, by the computer device, an action based on the threat, the risk level of ones of the components affected by the threat, and the risk level of the system; and reconfiguring, by the computer device, the networked computer system based on the determined action.Type: GrantFiled: November 26, 2019Date of Patent: January 3, 2023Assignee: KYNDRYL, INC.Inventors: Jack Louis Cherkas, Clea Zolotow, Kim Poh Wong, Susheel Gooly, Jørgen Egbert Floes, Jeanette Louise Livings, Tedrick N. Northway
-
Publication number: 20220345367Abstract: A processor may identify one or more requirements based on a specific field. The processor may capture the one or more requirements. The one or more requirements may be based on a particular structure. The processor may orchestrate the one or more requirements based on respective requests of the one or more requirements. The processor may store the orchestration of the one or more requirements as respective artifacts.Type: ApplicationFiled: April 27, 2021Publication date: October 27, 2022Inventors: HARI KRISHNA KOLLA, Kim Poh Wong
-
Patent number: 11394717Abstract: A method, computer program product, and a system where a processor(s) obtains, via a web interface, from a client, over a public network connection, a request to register for a financial transaction; a smart contract comprises the requested financial transaction. The processor(s) maps the client to a pre-defined security profile based on a security level associated with the security profile. The processor(s) selects, based on the security level, encryption keys from a repository and security codes. The processor(s) executes an encryption script, to automatically encrypt the contents of the smart contract utilizing the encryption keys and the security codes and by embedding SafeMath library codes in the smart contract.Type: GrantFiled: April 3, 2020Date of Patent: July 19, 2022Assignee: Kyndryl, Inc.Inventors: Kim Poh Wong, Vineet Prakash, Sonthaya Merin
-
Publication number: 20220171662Abstract: A transitioning process to integrate a computer-related service with one or more other computer-related services. The computer-related service and the one or more other computer-related services are analyzed to determine whether there is a conflict in integrating the computer-related service in the computing environment. A determination is made based on the analyzing whether one or more changes are to be made to a selected component. At least the analyzing and the determining are part of an automated process generated to integrate the computer-related service, and the automated process is at least a part of the transitioning process. An indication of a performance impact of executing at least the automated process to integrate the computer-related service is obtained. The transitioning process is to continue based on the performance impact meeting one or more selected criteria and based on determining that there are not one or more changes to be made to the selected component.Type: ApplicationFiled: November 27, 2020Publication date: June 2, 2022Inventors: Hong Dan Zhan, Kim Poh Wong
-
Publication number: 20220156226Abstract: A processor determines the data to be replicated in the production site. The processor splits the data into a plurality of blocks. The processor determines one or more replication links. The processor determines an order of each one of the plurality of blocks to be sent over the one or more replication links, where the order of each one of the plurality of blocks to be sent over the one or more replication links is determined by a machine learning model.Type: ApplicationFiled: November 13, 2020Publication date: May 19, 2022Inventors: Kim Poh Wong, Young Soo Basler
-
Publication number: 20220058498Abstract: A system for determining the optimal backup and restore location for lightweight applications is provided. A computer device identifies a set of training data, wherein the training data identifies a lightweight container, a corresponding backup lightweight container, and an optimization score for the lightweight container and the corresponding backup lightweight container. The computing device trains a machine learning model utilizing the identified training data. The computing device identifies a new lightweight container for backup. The computing device determines an optimal backup lightweight container for the new lightweight container utilizing the trained machine learning model.Type: ApplicationFiled: August 24, 2020Publication date: February 24, 2022Inventors: GIRISH VILAS RANE, PEI WEN KHOR, Kim Poh Wong
-
Publication number: 20210314324Abstract: A method, computer program product, and a system where a processor(s) obtains, via a web interface, from a client, over a public network connection, a request to register for a financial transaction; a smart contract comprises the requested financial transaction. The processor(s) maps the client to a pre-defined security profile based on a security level associated with the security profile. The processor(s) selects, based on the security level, encryption keys from a repository and security codes. The processor(s) executes an encryption script, to automatically encrypt the contents of the smart contract utilizing the encryption keys and the security codes and by embedding SafeMath library codes in the smart contract.Type: ApplicationFiled: April 3, 2020Publication date: October 7, 2021Inventors: Kim Poh Wong, Vineet Prakash, Sonthaya Merin
-
Patent number: 11093354Abstract: A system and method for triggering a recovery action during a component disruption in a production environment includes receiving data inputs from a plurality of components comprising the production environment, detecting an abnormality associated with a component of the plurality of components by analyzing the data inputs, and in response to the detecting the abnormality, triggering an analysis of the abnormality, analyzing the abnormality using a plurality of artificial intelligence engines to determine a plurality of outcomes from each artificial engine, consolidating the plurality of outcomes into a single outcome, the single outcome being input into an annotator engine to determine the recovery action to take during the component disruption in the production environment, and implementing the recovery action specific to the component with the detected abnormality.Type: GrantFiled: September 19, 2018Date of Patent: August 17, 2021Assignee: International Business Machines CorporationInventors: Kim Poh Wong, Diego Sonvico, Christopher Orfanos
-
Publication number: 20210173706Abstract: Systems and methods are provided for cognitive scheduling. A computer-implemented cognitive scheduling method includes receiving a plurality of computer executable tasks. The cognitive scheduling method also determines environmental parameters for executing each of the plurality of computer executable tasks. Additionally, the cognitive scheduling method generates a risk assessment for the plurality of computer executable tasks based on the environmental parameters of the respective computer executable tasks compared against a set of annotation criteria. A time slot in a scheduling list is assigning to each of the plurality of computer executable tasks based on the risk assessment. Based on the scheduling list, each of the plurality of computer executable tasks is executed in chronological order.Type: ApplicationFiled: December 4, 2019Publication date: June 10, 2021Inventors: Kim Poh Wong, Rakesh Ganjoo
-
Patent number: 11030015Abstract: A method and system for improving hardware and software resource optimization technology is provided. The method includes retrieving and analyzing operational parameters of hardware and software systems. In response, a probability of impact with respect to modified sizing requirements associated with the hardware and software systems is determined and actions including logical rules mapped to the operational parameters is determined. The actions are executed and an actual impact with respect to executing the modified sizing requirements is determined. In response, operational allocations of the hardware and software systems are modified with respect to operational functionality of the hardware and software systems.Type: GrantFiled: September 19, 2019Date of Patent: June 8, 2021Assignee: International Business Machines CorporationInventors: Kim Poh Wong, Yanjun Ma
-
Publication number: 20210160255Abstract: A method includes: determining, by a computer device, affinities between components in a networked computer system; determining, by the computer device, a risk level of each of the components; determining, by the computer device, a risk level of the networked computer system; detecting, by the computer device, a threat in the networked computer system; determining, by the computer device, an action based on the threat, the risk level of ones of the components affected by the threat, and the risk level of the system; and reconfiguring, by the computer device, the networked computer system based on the determined action.Type: ApplicationFiled: November 26, 2019Publication date: May 27, 2021Inventors: Jack Louis CHERKAS, Clea ZOLOTOW, Kim Poh WONG, Susheel GOOLY, Jørgen Egbert FLOES, Jeanette Louise LIVINGS, Tedrick N. NORTHWAY
-
Publication number: 20210089360Abstract: A method and system for improving hardware and software resource optimization technology is provided. The method includes retrieving and analyzing operational parameters of hardware and software systems. In response, a probability of impact with respect to modified sizing requirements associated with the hardware and software systems is determined and actions including logical rules mapped to the operational parameters is determined. The actions are executed and an actual impact with respect to executing the modified sizing requirements is determined. In response, operational allocations of the hardware and software systems are modified with respect to operational functionality of the hardware and software systems.Type: ApplicationFiled: September 19, 2019Publication date: March 25, 2021Inventors: Kim Poh Wong, Yanjun Ma
-
Publication number: 20200089586Abstract: A system and method for triggering a recovery action during a component disruption in a production environment includes receiving data inputs from a plurality of components comprising the production environment, detecting an abnormality associated with a component of the plurality of components by analyzing the data inputs, and in response to the detecting the abnormality, triggering an analysis of the abnormality, analyzing the abnormality using a plurality of artificial intelligence engines to determine a plurality of outcomes from each artificial engine, consolidating the plurality of outcomes into a single outcome, the single outcome being input into an annotator engine to determine the recovery action to take during the component disruption in the production environment, and implementing the recovery action specific to the component with the detected abnormality.Type: ApplicationFiled: September 19, 2018Publication date: March 19, 2020Inventors: Kim Poh Wong, Diego Sonvico, Christopher Orfanos