Patents by Inventor Mariusz Sabath

Mariusz Sabath has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240126526
    Abstract: Mechanisms are provided for improving performance of container images. Container image chunks are generated from a container image file and input into one or more trained machine learning (ML) computer models, trained to classify container image chunks with regard to a plurality of container image performance characteristic classifications. For each container image chunk it is determined whether the a corresponding classification is negative, and in response to the classification being negative, an entry in a knowledge base having patterns of content matching content in the container image chunk is identified to determine one or more reasons for modification of the chunk specified in the entry. A notification output is generated specifying the container image chunks, their corresponding container image performance characteristic classifications, and the reasons for modification of the chunks.
    Type: Application
    Filed: October 14, 2022
    Publication date: April 18, 2024
    Inventors: Abhishek Malvankar, Alaa S. Youssef, Chen Wang, Mariusz Sabath
  • Patent number: 11677549
    Abstract: A processor may generate one or more encrypted policies associated with a policy creator. A processor may generate token metadata associated with a user utilizing the one or more encrypted policies. A processor may encrypt the token metadata to form encrypted token metadata. A processor may send the one or more encrypted policies and the encrypted token metadata to a policy evaluator. The policy evaluator may evaluate the one or more encrypted policies and the encrypted token metadata. The processor may return a response. The response may be based on the evaluation by the policy evaluator.
    Type: Grant
    Filed: March 30, 2021
    Date of Patent: June 13, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jia Jun Brandon Lum, Mariusz Sabath, Alaa S. Youssef
  • Patent number: 11652631
    Abstract: Techniques regarding the use of digital identity tokens describing a computer application to obtain authorization to confidential data based on one or more policies are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a trusted platform module component that can generate a digital identity token that is bound to a computer application process. The computer executable components can also comprise a key authenticity component that can compare the digital identity token to a security key to retrieve a security credential.
    Type: Grant
    Filed: June 27, 2019
    Date of Patent: May 16, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mariusz Sabath, Jia Jun Brandon Lum, Malgorzata Steinder, Daniel Pittner
  • Publication number: 20220321335
    Abstract: A processor may generate one or more encrypted policies associated with a policy creator. A processor may generate token metadata associated with a user utilizing the one or more encrypted policies. A processor may encrypt the token metadata to form encrypted token metadata. A processor may send the one or more encrypted policies and the encrypted token metadata to a policy evaluator. The policy evaluator may evaluate the one or more encrypted policies and the encrypted token metadata. The processor may return a response. The response may be based on the evaluation by the policy evaluator.
    Type: Application
    Filed: March 30, 2021
    Publication date: October 6, 2022
    Inventors: JIA JUN BRANDON LUM, Mariusz Sabath, Alaa S. Youssef
  • Patent number: 11150893
    Abstract: According to one or more embodiments of the present invention, a computer-implemented method includes uploading, by a first instance of an integrated development environment (IDE), a first source-code change to a change log of a version control system. A second instance of the IDE is used to upload a second source-code change to the change log of the version control system. A determination is made that the second source-code change conflicts with the first source-code change. Based on the determination that the second source-code change conflicts with the first source-code change, generating a notification of the second source-code change is generated in the first instance of the IDE.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: October 19, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mariusz Sabath, Ali Kanso, Michael Joseph Spreitzer, Hai Huang
  • Patent number: 10897497
    Abstract: Aspects of the invention include selecting a node for an infrastructure update. The selected node is included in a cluster of nodes executing workloads that include containers. A future workload is prevented from being scheduled on the selected node. A workload currently executing on the selected node is migrated to another node included in the cluster of nodes. Infrastructure code on the selected node is updated, and in response to the updating, the ability to schedule a future workload on the selected node is enabled.
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: January 19, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mariusz Sabath, Jia Jun Brandon Lum, Alaa Youssef, Malgorzata Steinder, Asser Nasreldin Tantawi
  • Publication number: 20200412540
    Abstract: Techniques regarding the use of digital identity tokens describing a computer application to obtain authorization to confidential data based on one or more policies are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a trusted platform module component that can generate a digital identity token that is bound to a computer application process. The computer executable components can also comprise a key authenticity component that can compare the digital identity token to a security key to retrieve a security credential.
    Type: Application
    Filed: June 27, 2019
    Publication date: December 31, 2020
    Inventors: Mariusz Sabath, Jia Jun Brandon Lum, Malgorzata Steinder, Daniel Pittner
  • Patent number: 10805237
    Abstract: Techniques are provided for automated employment of respective quota managers for framework instances, where the respective quota managers can negotiate amongst themselves to manage usage of a resource of a shared computing system in relation to a quota for the resource for a tenant of the shared computing system. This can allow tenants to share their quota among multiple frameworks, enable quota exchange between multiple frameworks, and choose a quota with a minimum costs, and thus maximize savings.
    Type: Grant
    Filed: July 26, 2019
    Date of Patent: October 13, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paolo Dettori, Hai Huang, Ali Kanso, Mariusz Sabath, Michael Joseph Spreitzer, Alaa Salah Youssef
  • Publication number: 20200285462
    Abstract: According to one or more embodiments of the present invention, a computer-implemented method includes uploading, by a first instance of an integrated development environment (IDE), a first source-code change to a change log of a version control system. A second instance of the IDE is used to upload a second source-code change to the change log of the version control system. A determination is made that the second source-code change conflicts with the first source-code change. Based on the determination that the second source-code change conflicts with the first source-code change, generating a notification of the second source-code change is generated in the first instance of the IDE.
    Type: Application
    Filed: March 8, 2019
    Publication date: September 10, 2020
    Inventors: Mariusz Sabath, ALI KANSO, Michael Joseph Spreitzer, Hai Huang
  • Publication number: 20200153898
    Abstract: Aspects of the invention include selecting a node for an infrastructure update. The selected node is included in a cluster of nodes executing workloads that include containers. A future workload is prevented from being scheduled on the selected node. A workload currently executing on the selected node is migrated to another node included in the cluster of nodes. Infrastructure code on the selected node is updated, and in response to the updating, the ability to schedule a future workload on the selected node is enabled.
    Type: Application
    Filed: November 13, 2018
    Publication date: May 14, 2020
    Inventors: Mariusz Sabath, Jia Jun Brandon Lum, Alaa Youssef, Malgorzata Steinder, Asser Nasreldin Tantawi
  • Patent number: 10491541
    Abstract: Techniques are provided for automated employment of respective quota managers for framework instances, where the respective quota managers can negotiate amongst themselves to manage usage of a resource of a shared computing system in relation to a quota for the resource for a tenant of the shared computing system. This can allow tenants to share their quota among multiple frameworks, enable quota exchange between multiple frameworks, and choose a quota with a minimum costs, and thus maximize savings.
    Type: Grant
    Filed: October 10, 2016
    Date of Patent: November 26, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paolo Dettori, Hai Huang, Ali Kanso, Mariusz Sabath, Michael Joseph Spreitzer, Alaa Salah Youssef
  • Publication number: 20190349315
    Abstract: Techniques are provided for automated employment of respective quota managers for framework instances, where the respective quota managers can negotiate amongst themselves to manage usage of a resource of a shared computing system in relation to a quota for the resource for a tenant of the shared computing system. This can allow tenants to share their quota among multiple frameworks, enable quota exchange between multiple frameworks, and choose a quota with a minimum costs, and thus maximize savings.
    Type: Application
    Filed: July 26, 2019
    Publication date: November 14, 2019
    Inventors: Paolo Dettori, Hai Huang, Ali Kanso, Mariusz Sabath, Michael Joseph Spreitzer, Alaa Salah Youssef
  • Publication number: 20180102984
    Abstract: Techniques are provided for automated employment of respective quota managers for framework instances, where the respective quota managers can negotiate amongst themselves to manage usage of a resource of a shared computing system in relation to a quota for the resource for a tenant of the shared computing system. This can allow tenants to share their quota among multiple frameworks, enable quota exchange between multiple frameworks, and choose a quota with a minimum costs, and thus maximize savings.
    Type: Application
    Filed: October 10, 2016
    Publication date: April 12, 2018
    Inventors: Paolo Dettori, Hai Huang, Ali Kanso, Mariusz Sabath, Michael Joseph Spreitzer, Alaa Salah Youssef
  • Publication number: 20110087522
    Abstract: A system and method of determining performance metrics for inclusion in a Service Level Agreement (SLA) between a customer and a host computing service provider. The method comprises: receiving a provisioning request from a customer including receiving computing performance requirement parameters and environmental parameters for inclusion in the SLA from the customer; deploying discovery tools to identify relevant infrastructure components based on performance metrics. Based on identification of the customer's relevant infrastructure components, probes are deployed and installed. Then, data is obtained from the probes while changing infrastructure components for simulating and assessing impact of one or more different customer scenarios for different performance policies. In one aspect, the obtained data is used to identify and implement an a priori risk sharing agreement between the customer and service provider.
    Type: Application
    Filed: October 8, 2009
    Publication date: April 14, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kirk A. Beaty, Rick A. Hamilton, II, Neal M. Keller, Andrzej Kochut, Clifford A. Pickover, Elizabeth J. Poole, Mariusz Sabath, Emmanuel Yashchin, Alexander Zlatsin
  • Patent number: 7672999
    Abstract: A system for enabling the transmission of a prepared message to multiple intended recipients, wherein the information contained in the message is substantially the same as received for all the recipients but differs in parts or portions for certain recipients comprising: a module containing the entire message which includes both the common and unique information to be transmitted and the instructions for selectively providing the information to different recipients; and scheme for sending together from the module all the parts or portions of the information to all recipients, but including means responsive to the instructions, for having selectively different parts or portions of the information received by the different recipients.
    Type: Grant
    Filed: January 8, 2002
    Date of Patent: March 2, 2010
    Assignee: International Business Machines Corporation
    Inventors: Sara H. Basson, Dimitri Kanevsky, Mariusz Sabath, Alexander Zlatsin
  • Patent number: 7233809
    Abstract: A system and method that provides data messages to a passive device. A passive device, for example watch, is registered together with the telephone number of a cellular telephone of a subscriber to the data message service. Since the cellular telephone periodically transmits a beacon signal, the wireless network knows its cell location. Accordingly, the system determines the cell location of the cellular telephone and establishes a communication of the subscribed data to the watch via the local cellular provider for the same cell location as that of the subscriber's cellular telephone.
    Type: Grant
    Filed: November 29, 2004
    Date of Patent: June 19, 2007
    Assignee: International Business Machines Corporation
    Inventors: Dimitri Kanevsky, Mariusz Sabath, Jan Sedivy, Alexander Zlatsin
  • Patent number: 7156309
    Abstract: A method and system that permits the purchase of a license to make a limited number of copies of a book. At the time of purchase, the purchaser or user is given a key that contains the ability to obtain the limited number of copies on demand. The key contains a web address that can be used to obtain the authorized copies. In some embodiments, the key is a label in a machine readable form that is readable by a label reader, such as a bar code reader or a magnetic reader. In other embodiments, the key is merely a web address that the user may contact. At the point of sale, the key or record is formed, affixed to the book and also sent to copy tracker. The copy tracker then keeps track of the copies as made and processes each request to make a copy. If permitted, a database is enabled to send an electronic image of the requested copy to the user.
    Type: Grant
    Filed: December 12, 2005
    Date of Patent: January 2, 2007
    Assignee: International Business Machines Corporation
    Inventors: Dimitri Kanevsky, Mariusz Sabath, Jan Sedivy, Alexander Zlatsin
  • Patent number: 7092907
    Abstract: Methods and system to progressively degrade a trial version of software products in various ways so as to permit the user to continue to use the product until the user becomes reliant on the product and becomes so frustrated that the user purchases the product. This approach, it may be noted, is also useful for discouraging illegal use of software without proper licenses. The trial or demonstration version of the software program may degrade in any one or more of a number of ways. For instance, the brightness may fade, the application window may shrink, the font may degrade, features may drop out, the display quality may degrade, the sound quality may diminish, the processing speed may decrease, or the network bandwidth may decrease.
    Type: Grant
    Filed: February 5, 2001
    Date of Patent: August 15, 2006
    Assignee: International Business Machines Corporation
    Inventors: Dimitri Kanevsky, Clifford A. Pickover, Mariusz Sabath, Alexander Zlatsin
  • Patent number: 7042442
    Abstract: The invention uses a recognition system of gestures that maps sequences of gestures to keys strings. In the practice of this invention, a user produces gestures without keyboards. Many experienced typists can type without looking at keyboards, and typists can make gestures, in the absence of a keyboard, that are similar to gestures that would be made if there were a keyboard. The gesture recognition system captures gestures for example, (via cameras) and interprets them as pressing an invisible keyboards, as if a keyboard were actually placed in a certain location under the typists hands. To coordinate the invisible keyboard in the correct place under the hands, the user may be provided with feedback. He or she can either view the results of the gestures via a display or hear sounds, via speakers, indicating the results of the gestures.
    Type: Grant
    Filed: June 27, 2000
    Date of Patent: May 9, 2006
    Assignee: International Business Machines Corporation
    Inventors: Dimitri Kanevsky, Mariusz Sabath, Alexander Zlatsin
  • Publication number: 20060091198
    Abstract: A method and system that permits the purchase of a license to make a limited number of copies of a book. At the time of purchase, the purchaser or user is given a key that contains the ability to obtain the limited number of copies on demand. The key contains a web address that can be used to obtain the authorized copies. In some embodiments, the key is a label in a machine readable form that is readable by a label reader, such as a bar code reader or a magnetic reader. In other embodiments, the key is merely a web address that the user may contact. At the point of sale, the key or record is formed, affixed to the book and also sent to copy tracker. The copy tracker then keeps track of the copies as made and processes each request to make a copy. If permitted, a database is enabled to send an electronic image of the requested copy to the user.
    Type: Application
    Filed: December 12, 2005
    Publication date: May 4, 2006
    Inventors: Dimitri Kanevsky, Mariusz Sabath, Jan Sedivy, Alexander Zlatsin