Patents by Inventor Luigi Pichetti

Luigi Pichetti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10904319
    Abstract: A method for determining a deployment configuration of multiple micro services that interact with each other is provided. The method includes the steps of determining a metric describing an amount of communication traffic between at least two of the micro services. Based on the metric, an execution environment may be determined for at least one of the micro services. Deployment information specifying that the at least one micro service shall be deployed on the determined execution environment may be generated.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: January 26, 2021
    Assignee: International Business Machines Corporation
    Inventors: Antonio Bagarolo, Antonio Di Cocco, Claudio Marinelli, Luigi Pichetti
  • Patent number: 10885200
    Abstract: The present disclosure relates to related methods, systems, and media containing instructions for detecting security risks related to a software component deployable in a container-based runtime environment. The method comprises receiving a trigger, the trigger indicating that a layer of a container within the container-based runtime environment is to be checked for security risks. A check layer of the container is identified that is to be checked for security risks. A determination is made that a check for security risks has not been previously performed for the check layer according to a check criterion, and responsive to this determination, a determination is made that a security analysis indicates a security risk. Responsive to this determination, a remedial action may be initiated.
    Type: Grant
    Filed: November 15, 2018
    Date of Patent: January 5, 2021
    Assignee: International Business Machines Corporation
    Inventors: Giuseppe Ciano, Luigi Pichetti
  • Publication number: 20200412625
    Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: building a change management meta model on relationships between change request tasks of a change request and logical components of a computing environment via deployment processes that realizes respective change request tasks onto the logical components. A change request fulfillment plan that minimizes a maintenance window for deploying the change request tasks to the logical components is produced. After deployment, performance metrics of the logical components updates change request constraints.
    Type: Application
    Filed: June 25, 2019
    Publication date: December 31, 2020
    Inventors: Antonio BAGAROLO, Antonio DI COCCO, Luigi PICHETTI, Paolo OTTAVIANO
  • Publication number: 20200410386
    Abstract: Monitoring and automatically remediating issues that arise at run-time during integrations between Application Program Interfaces (APIs) of two or more endpoint products over an integration framework. The monitoring is facilitated by inserting specialized modules into the integration framework that detects changes in the outputs of the integrated endpoint products and attempts to remedy them by automatically adjusting the output in-transit towards a destination endpoint. The specialized modules can be enhanced by machine learning algorithms trained on previously successful remedies. Remedies may be directed towards schema variations and performance drifts, among others.
    Type: Application
    Filed: June 25, 2019
    Publication date: December 31, 2020
    Inventors: Linwood E. Loving, Pietro Iannucci, Mark David Batinich, Luigi Pichetti
  • Publication number: 20200404012
    Abstract: A first latest status of the one or more disconnected endpoints from a memory is retrieved. A set of predicted vulnerabilities for each of the one or more disconnected endpoints from the memory is retrieved. A set of preventive actions and policies associated with the set of predicted vulnerabilities to be performed when each of the one or more disconnected endpoints reconnects to the network is retrieved. The set of preventive actions and policies are retrieved from the memory. A determination is made whether at least one endpoint in the one or more endpoints not connected to the network reconnects to the network. If least one endpoint in the one or more endpoints not connected to the network has reconnected to the network, at least one preventive action from the set of preventive actions and policies on the at least one endpoint reconnected to the network is performed.
    Type: Application
    Filed: June 18, 2019
    Publication date: December 24, 2020
    Inventors: Luigi Pichetti, Paavo Anselmi Parkkinen, Daniel W. Montgomery
  • Patent number: 10834227
    Abstract: An approach is described with respect to conversational agent learning model service selection in response to a client service request. According to such approach, a model advisor may predict which model service(s) may most appropriately address a client issue. A method pertaining to such approach may include receiving a client service request associated with a client system and data associated with the client service request, wherein the data associated with the client service request includes at least one keyword extracted from the client service request and context information. The method further may include, based upon the data associated with the client service request, selecting at least one model service among a plurality of model services associated with a conversational agent learning model. The method further may include providing the selection of the at least one model service to the client system in response to the client service request.
    Type: Grant
    Filed: February 13, 2018
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Giuseppe Ciano, Luigi Pichetti
  • Patent number: 10831575
    Abstract: A computer-implemented method includes: receiving, by a computing device, information for composing a first enhanced plug-in, wherein the first enhanced plug-in includes one or more logical components for invoking the first enhanced plug-in by an application running in a different framework as the first enhanced plug-in; receiving, by the computing device, information for creating a workflow that includes a series of a plurality of enhanced plug-ins including the first enhanced plug-in and one or more subsequent second enhanced plug-ins; and invoking, by the computing device, the workflow, wherein the invoking the workflow causes the first enhanced plug-in to receive data from an application running on the same or different framework as the first enhanced plug-in, process the data, and forward the processed data as input data to a particular one of the one or more subsequent second enhanced plug-ins or an endpoint application.
    Type: Grant
    Filed: November 8, 2019
    Date of Patent: November 10, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark D. Batinich, Pietro Iannucci, Linwood E. Loving, Allison V. Pelt, Luigi Pichetti
  • Publication number: 20200313967
    Abstract: A computer system performs software discovery on a shared resource in a network. A logical group is generated for the shared resource, wherein the logical group includes a plurality of devices accessing the shared resource. A designated device is selected from the plurality of devices for performing a software discovery operation on the shared resource, wherein the selection is based on one or more performance factors. Results of the software discovery operation on the shared resource are received from the designated device. The results of the software discovery operation are distributed by the designated device to the plurality of devices. Embodiments of the present invention further include a method and program product for performing software discovery on a shared resource in a network in substantially the same manner described above.
    Type: Application
    Filed: March 26, 2019
    Publication date: October 1, 2020
    Inventors: Dariusz P. Glocki, Artur Obrzut, Piotr P. Godowski, Luigi Pichetti
  • Patent number: 10733289
    Abstract: A solution is proposed for identifying software components in a computing system. A corresponding method comprises monitoring events relating to one or more software components of the computing system, filtering the events into filtered events according to finalizing events of corresponding event sequences ending with the finalizing events, each of the event sequences relating to a logical operation for a corresponding current software component of the software components being finalized by the finalizing events, and determining corresponding current signatures of the current software components of the filtered events, each of the current signatures being determined according to at least part of a content of the corresponding current software component for use to identify the current software component according to a comparison of the current signature with one or more known signatures of known software components.
    Type: Grant
    Filed: September 2, 2017
    Date of Patent: August 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Piotr Godowski, Grzegorz Majka, Artur Obrzut, Luigi Pichetti
  • Publication number: 20200220781
    Abstract: A method and system. One or more local parameters are collected from one or more corresponding endpoints. Each policy of one or more policies includes an indication of one or more activities for execution on the corresponding endpoints. At least one of the activities of the policies is conditioned by a condition based on one or more aggregated parameters. Each aggregated parameter depends on at least one of the one or more local parameters. The local parameters are aggregated into the aggregated parameters. Each aggregated parameter is distributed at least to the corresponding endpoints of each policy including any activity conditioned on the aggregated parameter. At least the corresponding policies are sent to the endpoints to cause each endpoint to apply each corresponding policy by collecting any aggregated parameters of the policy on the endpoint and executing the activities of the policy according to the corresponding aggregated parameters.
    Type: Application
    Filed: March 23, 2020
    Publication date: July 9, 2020
    Inventors: Marco Imperia, Luigi Pichetti, Marco Secchi, Stefano Sidoti
  • Patent number: 10692157
    Abstract: A method, computer system, and computer program product for retrieving information is provided. The method comprises receiving an information request, determining corresponding confidence indexes of a plurality of information sources, each of the confidence indexes being indicative of a capability of the corresponding information source to respond to the information request determined according to one or more social activities relating thereto, selecting a selected information source of said information sources according to the confidence indexes, submitting the information request to the selected information source, receiving selected information from the selected information source in response to the information request, and returning the selected information as a result of the information request.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: June 23, 2020
    Assignee: International Business Machines Corporation
    Inventors: Giuseppe Ciano, Marco Esposito, Luigi Pichetti
  • Patent number: 10666515
    Abstract: A method and system. One or more policies is stored. Each policy includes activities for execution on corresponding endpoints. At least one of the activities of the policies is conditioned by a condition based on one or more aggregated parameters. Each aggregated parameter depends on one or more local parameters of a corresponding group of endpoints. The local parameters are collected from the corresponding endpoints. The local parameters are aggregated into the aggregated parameters. Each aggregated parameter is distributed at least to the corresponding endpoints of each policy including any activity conditioned on the aggregated parameter. At least the corresponding policies are sent to the endpoints to cause each endpoint to apply each corresponding policy by collecting any aggregated parameters of the policy on the endpoint and executing the activities of the policy according to the corresponding aggregated parameters.
    Type: Grant
    Filed: January 17, 2017
    Date of Patent: May 26, 2020
    Assignee: International Business Machines Corporation
    Inventors: Marco Imperia, Luigi Pichetti, Marco Secchi, Stefano Sidoti
  • Publication number: 20200159933
    Abstract: The present disclosure relates to related methods, systems, and media containing instructions for detecting security risks related to a software component deployable in a container-based runtime environment. The method comprises receiving a trigger, the trigger indicating that a layer of a container within the container-based runtime environment is to be checked for security risks. A check layer of the container is identified that is to be checked for security risks. A determination is made that a check for security risks has not been previously performed for the check layer according to a check criterion, and responsive to this determination, a determination is made that a security analysis indicates a security risk. Responsive to this determination, a remedial action may be initiated.
    Type: Application
    Filed: November 15, 2018
    Publication date: May 21, 2020
    Inventors: Giuseppe Ciano, Luigi Pichetti
  • Publication number: 20200159819
    Abstract: Provided is a computer-implemented method, system, and computer program product for processing an electronic document. The method may include retrieving an electronic document during a computing session maintained for a user of a computer system. The method may also include determining context information related to the computing session. The method may also include selecting at least one annotator from a set of annotators based on the context information, the at least one annotator comprising data describing a set of rules for annotating content of the electronic document. The method may also include associate the selected annotator with the electronic document, wherein the associating is specific to the user.
    Type: Application
    Filed: November 16, 2018
    Publication date: May 21, 2020
    Inventors: Francesco Maria Carteri, Luigi Pichetti, Giuseppe Ciano
  • Patent number: 10635482
    Abstract: Controlling usage of virtual disks in a data-processing center hosting a set of virtual machines is described where each virtual disk comprises a set of software artifacts. A corresponding method comprises detecting a request of adding a new virtual disk comprising a set of new software artifacts to a selected one of the virtual machines, determining composition information of the new virtual disk, which includes an indication of the new software artifacts, retrieving an indication of usage entitlements of the new software artifacts in the data-processing center, enabling or preventing the attachment of the new virtual disk to the selected virtual machine according to a comparison between the composition information and the usage entitlements, attaching the new virtual disk to the selected virtual machine in response to the enabling thereof, and updating the usage entitlements in response to the attachment of the new virtual disk.
    Type: Grant
    Filed: March 21, 2019
    Date of Patent: April 28, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mauro Arcese, Giuseppe Ciano, Luigi Pichetti
  • Patent number: 10599497
    Abstract: A computer-implemented method includes: receiving, by a computing device, information for composing a first enhanced plug-in, wherein the first enhanced plug-in includes one or more logical components for invoking the first enhanced plug-in by an application running in a different framework as the first enhanced plug-in; receiving, by the computing device, information for creating a workflow that includes a series of a plurality of enhanced plug-ins including the first enhanced plug-in and one or more subsequent second enhanced plug-ins; and invoking, by the computing device, the workflow, wherein the invoking the workflow causes the first enhanced plug-in to receive data from an application running on the same or different framework as the first enhanced plug-in, process the data, and forward the processed data as input data to a particular one of the one or more subsequent second enhanced plug-ins or an endpoint application.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: March 24, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark D. Batinich, Pietro Iannucci, Linwood E. Loving, Allison V. Pelt, Luigi Pichetti
  • Patent number: 10586187
    Abstract: A method for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task.
    Type: Grant
    Filed: January 14, 2019
    Date of Patent: March 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michele D'Urso, Luigi Pichetti, Marco Secchi, Stefano Sidoti
  • Publication number: 20200073737
    Abstract: A computer-implemented method includes: receiving, by a computing device, information for composing a first enhanced plug-in, wherein the first enhanced plug-in includes one or more logical components for invoking the first enhanced plug-in by an application running in a different framework as the first enhanced plug-in; receiving, by the computing device, information for creating a workflow that includes a series of a plurality of enhanced plug-ins including the first enhanced plug-in and one or more subsequent second enhanced plug-ins; and invoking, by the computing device, the workflow, wherein the invoking the workflow causes the first enhanced plug-in to receive data from an application running on the same or different framework as the first enhanced plug-in, process the data, and forward the processed data as input data to a particular one of the one or more subsequent second enhanced plug-ins or an endpoint application.
    Type: Application
    Filed: November 8, 2019
    Publication date: March 5, 2020
    Inventors: Mark D. BATINICH, Pietro IANNUCCI, Linwood E. LOVING, Allison V. PELT, Luigi PICHETTI
  • Publication number: 20200057621
    Abstract: A method for creating a software image of a software application. During an installation of the software application on a computing machine, one or more changes of the computing machine occurring during the installation of the software application are detected. The one or more changes include one or more artifacts being added to the computing machine and one or more updates being applied to the computing machine. The software image is created by copying the one or more artifacts from the computing machine to a virtual disk and by adding activation procedures and activation information obtained from the activation procedures to the virtual disk. The activation procedures and activation information were determined according to the updates. The activation procedures are configured to apply the updates when running the activation procedures according to the activation information.
    Type: Application
    Filed: October 24, 2019
    Publication date: February 20, 2020
    Inventors: Mauro Arcese, Giuseppe Ciano, Claudio Marinelli, Luigi Pichetti
  • Publication number: 20200057670
    Abstract: Embodiments include systems, methods, and computer program products to perform an operation for managing different virtual machine images as a single virtual machine image. The operation generally includes generating a representation of a virtual machine (VM) image, and generating a first VM instance from the VM image. The representation of the VM image includes a set of artifacts associated with the VM image. The operation also includes receiving an indication of an available software update. Upon determining that the software update is applicable to the representation of the VM image, the operation further includes applying the software update to the first VM instance image.
    Type: Application
    Filed: October 24, 2019
    Publication date: February 20, 2020
    Inventors: Gianluca BERNARDINI, Antonio DI COCCO, Claudio MARINELLI, Luigi PICHETTI