Patents by Inventor Kim Poh Wong

Kim Poh Wong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240061674
    Abstract: Application transition and transformation is provided by observing and analyzing execution of a monolithic application to provide properties of the data communication of the monolithic application, identifying, by an artificial intelligence engine, atomic application element(s) having logical functional block(s) that function independent of other atomic application element, determining, by the artificial intelligence engine, candidate atomic application element(s) for migrating out of the monolithic application and refactoring, based on automated testing and validation, refactoring at least one candidate atomic application element into a respective at least one refactored element, where the refactoring selects a platform technology for the refactored element and implements functionality of the candidate atomic application element as the refactored element of the selected platform technology, and providing the at least one refactored element to system(s) for execution thereon.
    Type: Application
    Filed: August 22, 2022
    Publication date: February 22, 2024
    Inventors: Clea ZOLOTOW, Susheel GOOLY, Rudolph C. BARON, JR., Kim Poh WONG, Marci D. FORMATO, Tedrick N. Northway
  • Patent number: 11650954
    Abstract: A processor determines the data to be replicated in the production site. The processor splits the data into a plurality of blocks. The processor determines one or more replication links. The processor determines an order of each one of the plurality of blocks to be sent over the one or more replication links, where the order of each one of the plurality of blocks to be sent over the one or more replication links is determined by a machine learning model.
    Type: Grant
    Filed: November 13, 2020
    Date of Patent: May 16, 2023
    Assignee: KYNDRYL, INC.
    Inventors: Kim Poh Wong, Young Soo Basler
  • Publication number: 20230138727
    Abstract: An approach is provided for determining a carbon footprint-based consumption of cloud resources. Cloud resource requirements and a carbon footprint cap of a workload of a cloud consumer are received. The requirements and cap are based on a sustainability target, published by the cloud consumer, and subscribed by cloud service providers. A list of cloud resources that satisfy the requirements are sent. Carbon emission values of the cloud resources at different load levels of the workload are sent. Based on a service level agreement requirement, a criticality level, and a peak load duration of the workload, and previous success rates of satisfying cloud resource requirements by cloud service providers, an optimized configuration of cloud resource(s) and cloud service provider(s) is selected. The cloud resource(s) are selected from the list and have a carbon footprint that does not exceed the cap at a given load level.
    Type: Application
    Filed: October 29, 2021
    Publication date: May 4, 2023
    Inventors: Kim Poh Wong, Firas Bouz, Seema Nagar, Pramod Vadayadiyil Raveendran
  • Patent number: 11546354
    Abstract: A method includes: determining, by a computer device, affinities between components in a networked computer system; determining, by the computer device, a risk level of each of the components; determining, by the computer device, a risk level of the networked computer system; detecting, by the computer device, a threat in the networked computer system; determining, by the computer device, an action based on the threat, the risk level of ones of the components affected by the threat, and the risk level of the system; and reconfiguring, by the computer device, the networked computer system based on the determined action.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: January 3, 2023
    Assignee: KYNDRYL, INC.
    Inventors: Jack Louis Cherkas, Clea Zolotow, Kim Poh Wong, Susheel Gooly, Jørgen Egbert Floes, Jeanette Louise Livings, Tedrick N. Northway
  • Publication number: 20220345367
    Abstract: A processor may identify one or more requirements based on a specific field. The processor may capture the one or more requirements. The one or more requirements may be based on a particular structure. The processor may orchestrate the one or more requirements based on respective requests of the one or more requirements. The processor may store the orchestration of the one or more requirements as respective artifacts.
    Type: Application
    Filed: April 27, 2021
    Publication date: October 27, 2022
    Inventors: HARI KRISHNA KOLLA, Kim Poh Wong
  • Patent number: 11394717
    Abstract: A method, computer program product, and a system where a processor(s) obtains, via a web interface, from a client, over a public network connection, a request to register for a financial transaction; a smart contract comprises the requested financial transaction. The processor(s) maps the client to a pre-defined security profile based on a security level associated with the security profile. The processor(s) selects, based on the security level, encryption keys from a repository and security codes. The processor(s) executes an encryption script, to automatically encrypt the contents of the smart contract utilizing the encryption keys and the security codes and by embedding SafeMath library codes in the smart contract.
    Type: Grant
    Filed: April 3, 2020
    Date of Patent: July 19, 2022
    Assignee: Kyndryl, Inc.
    Inventors: Kim Poh Wong, Vineet Prakash, Sonthaya Merin
  • Publication number: 20220171662
    Abstract: A transitioning process to integrate a computer-related service with one or more other computer-related services. The computer-related service and the one or more other computer-related services are analyzed to determine whether there is a conflict in integrating the computer-related service in the computing environment. A determination is made based on the analyzing whether one or more changes are to be made to a selected component. At least the analyzing and the determining are part of an automated process generated to integrate the computer-related service, and the automated process is at least a part of the transitioning process. An indication of a performance impact of executing at least the automated process to integrate the computer-related service is obtained. The transitioning process is to continue based on the performance impact meeting one or more selected criteria and based on determining that there are not one or more changes to be made to the selected component.
    Type: Application
    Filed: November 27, 2020
    Publication date: June 2, 2022
    Inventors: Hong Dan Zhan, Kim Poh Wong
  • Publication number: 20220156226
    Abstract: A processor determines the data to be replicated in the production site. The processor splits the data into a plurality of blocks. The processor determines one or more replication links. The processor determines an order of each one of the plurality of blocks to be sent over the one or more replication links, where the order of each one of the plurality of blocks to be sent over the one or more replication links is determined by a machine learning model.
    Type: Application
    Filed: November 13, 2020
    Publication date: May 19, 2022
    Inventors: Kim Poh Wong, Young Soo Basler
  • Publication number: 20220058498
    Abstract: A system for determining the optimal backup and restore location for lightweight applications is provided. A computer device identifies a set of training data, wherein the training data identifies a lightweight container, a corresponding backup lightweight container, and an optimization score for the lightweight container and the corresponding backup lightweight container. The computing device trains a machine learning model utilizing the identified training data. The computing device identifies a new lightweight container for backup. The computing device determines an optimal backup lightweight container for the new lightweight container utilizing the trained machine learning model.
    Type: Application
    Filed: August 24, 2020
    Publication date: February 24, 2022
    Inventors: GIRISH VILAS RANE, PEI WEN KHOR, Kim Poh Wong
  • Publication number: 20210314324
    Abstract: A method, computer program product, and a system where a processor(s) obtains, via a web interface, from a client, over a public network connection, a request to register for a financial transaction; a smart contract comprises the requested financial transaction. The processor(s) maps the client to a pre-defined security profile based on a security level associated with the security profile. The processor(s) selects, based on the security level, encryption keys from a repository and security codes. The processor(s) executes an encryption script, to automatically encrypt the contents of the smart contract utilizing the encryption keys and the security codes and by embedding SafeMath library codes in the smart contract.
    Type: Application
    Filed: April 3, 2020
    Publication date: October 7, 2021
    Inventors: Kim Poh Wong, Vineet Prakash, Sonthaya Merin
  • Patent number: 11093354
    Abstract: A system and method for triggering a recovery action during a component disruption in a production environment includes receiving data inputs from a plurality of components comprising the production environment, detecting an abnormality associated with a component of the plurality of components by analyzing the data inputs, and in response to the detecting the abnormality, triggering an analysis of the abnormality, analyzing the abnormality using a plurality of artificial intelligence engines to determine a plurality of outcomes from each artificial engine, consolidating the plurality of outcomes into a single outcome, the single outcome being input into an annotator engine to determine the recovery action to take during the component disruption in the production environment, and implementing the recovery action specific to the component with the detected abnormality.
    Type: Grant
    Filed: September 19, 2018
    Date of Patent: August 17, 2021
    Assignee: International Business Machines Corporation
    Inventors: Kim Poh Wong, Diego Sonvico, Christopher Orfanos
  • Publication number: 20210173706
    Abstract: Systems and methods are provided for cognitive scheduling. A computer-implemented cognitive scheduling method includes receiving a plurality of computer executable tasks. The cognitive scheduling method also determines environmental parameters for executing each of the plurality of computer executable tasks. Additionally, the cognitive scheduling method generates a risk assessment for the plurality of computer executable tasks based on the environmental parameters of the respective computer executable tasks compared against a set of annotation criteria. A time slot in a scheduling list is assigning to each of the plurality of computer executable tasks based on the risk assessment. Based on the scheduling list, each of the plurality of computer executable tasks is executed in chronological order.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 10, 2021
    Inventors: Kim Poh Wong, Rakesh Ganjoo
  • Patent number: 11030015
    Abstract: A method and system for improving hardware and software resource optimization technology is provided. The method includes retrieving and analyzing operational parameters of hardware and software systems. In response, a probability of impact with respect to modified sizing requirements associated with the hardware and software systems is determined and actions including logical rules mapped to the operational parameters is determined. The actions are executed and an actual impact with respect to executing the modified sizing requirements is determined. In response, operational allocations of the hardware and software systems are modified with respect to operational functionality of the hardware and software systems.
    Type: Grant
    Filed: September 19, 2019
    Date of Patent: June 8, 2021
    Assignee: International Business Machines Corporation
    Inventors: Kim Poh Wong, Yanjun Ma
  • Publication number: 20210160255
    Abstract: A method includes: determining, by a computer device, affinities between components in a networked computer system; determining, by the computer device, a risk level of each of the components; determining, by the computer device, a risk level of the networked computer system; detecting, by the computer device, a threat in the networked computer system; determining, by the computer device, an action based on the threat, the risk level of ones of the components affected by the threat, and the risk level of the system; and reconfiguring, by the computer device, the networked computer system based on the determined action.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Jack Louis CHERKAS, Clea ZOLOTOW, Kim Poh WONG, Susheel GOOLY, Jørgen Egbert FLOES, Jeanette Louise LIVINGS, Tedrick N. NORTHWAY
  • Publication number: 20210089360
    Abstract: A method and system for improving hardware and software resource optimization technology is provided. The method includes retrieving and analyzing operational parameters of hardware and software systems. In response, a probability of impact with respect to modified sizing requirements associated with the hardware and software systems is determined and actions including logical rules mapped to the operational parameters is determined. The actions are executed and an actual impact with respect to executing the modified sizing requirements is determined. In response, operational allocations of the hardware and software systems are modified with respect to operational functionality of the hardware and software systems.
    Type: Application
    Filed: September 19, 2019
    Publication date: March 25, 2021
    Inventors: Kim Poh Wong, Yanjun Ma
  • Publication number: 20200089586
    Abstract: A system and method for triggering a recovery action during a component disruption in a production environment includes receiving data inputs from a plurality of components comprising the production environment, detecting an abnormality associated with a component of the plurality of components by analyzing the data inputs, and in response to the detecting the abnormality, triggering an analysis of the abnormality, analyzing the abnormality using a plurality of artificial intelligence engines to determine a plurality of outcomes from each artificial engine, consolidating the plurality of outcomes into a single outcome, the single outcome being input into an annotator engine to determine the recovery action to take during the component disruption in the production environment, and implementing the recovery action specific to the component with the detected abnormality.
    Type: Application
    Filed: September 19, 2018
    Publication date: March 19, 2020
    Inventors: Kim Poh Wong, Diego Sonvico, Christopher Orfanos