Patents by Inventor Nikolai A. Joukov
Nikolai A. Joukov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120109844Abstract: A system and method for cost-based migration planning includes determining cost factors and constraints associated with at least one of migrating and transforming a plurality of components. A cost-based model is constructed using the cost factors and constraints. The cost-based model is applied to groupings of the plurality of components to provide a cost-based determination grouping scheme in accordance with the constraints. The grouping scheme is output to provide migration waves for migrating or transforming the plurality of components.Type: ApplicationFiled: November 3, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Murthy Devarakonda, Nikolai A. Joukov, Birgit M. Pfitzmann, Lawrence H. Thompson
-
Publication number: 20120072903Abstract: A system and method for application migration include matching an infrastructure of a source application with a plurality of multi-image work sets from a catalog by selecting a mapping of components of the infrastructure with components in the multi-image work sets to provide one or more selected multi-images. The source application is migrated to a target environment using the one or more selected multi-images.Type: ApplicationFiled: September 20, 2010Publication date: March 22, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: NIKOLAI A. JOUKOV, Birgit M. Pfitzmann
-
Publication number: 20120072709Abstract: Techniques for unstacking software components are provided. The techniques include discovering a plurality of software components and one or more dependencies between the software components in a computer system, designing a plurality of unstacking options for unstacking said components, and selecting one of said unstacking options to unstack said components.Type: ApplicationFiled: September 22, 2010Publication date: March 22, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nikolai Joukov, Matthew Markley, Birgit Pfitzmann, Michael Tacci
-
Publication number: 20120054727Abstract: A system and method includes discovering one or more instances of external resource access by statically analyzing application code. One or more locations of constants are identified in the application code and a configuration repository that specify addresses of discovered instances of external resource access. The application code and the configuration repository are updated to change values of the constants to enable migration.Type: ApplicationFiled: August 30, 2010Publication date: March 1, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nikolai A. Joukov, Joel P. Ossher, Birgit M. Pfitzmann, Vasily Tarasov
-
Publication number: 20120047492Abstract: Configuration information associated with software installed on a production system may be discovered. A script is automatically generated for capturing data traffic from and to the software installed on the production system using the configuration information. The script may be executed to capture data traffic of the software running on the production system. A migrated version of the software may be executed on a test system using requests extracted from the captured data traffic. The responses in the captured data traffic may be compared with responses from the migrated version of the software.Type: ApplicationFiled: August 17, 2010Publication date: February 23, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hai Huang, Nikolai A. Joukov, Birgit M. Pfitzmann
-
Publication number: 20110302647Abstract: Automating network reconfiguration such as firewall reconfiguration in migrations may include determining network reconfiguration needs in one or more network functionalities of the target environment based on the discovering; and applying the network reconfiguration needs to the one or more network functionalities in the target environment.Type: ApplicationFiled: June 3, 2010Publication date: December 8, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kamal Bhattacharya, Nikolai A. Joukov, Birgit Pfitzmann, HariGovind V. Ramasamy
-
Publication number: 20110252403Abstract: Component relinking in migrations may include discovering one or more dependencies in one or more components; planning one or more new locations where the one or more components are to be placed; determining relinking needs in the one or more components based on the discovering and the planning; and applying the relinking needs.Type: ApplicationFiled: April 13, 2010Publication date: October 13, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nikolai A. Joukov, Matthew A. Markley, Birgit Pfitzmann, HariGovind V. Ramasamy
-
Patent number: 8037240Abstract: A system and method for providing reversed backup operation for keeping local hard drives in a stand-by (non-spinning) mode thereby extending the life of local hard drives and reducing power consumption, heat and noise produced by the local drives. The present invention uses remote storage systems as primary storage systems when the network connectivity and its bandwidth are sufficient so that the local hard disk can stay in the stand-by mode. If the network connectivity is unavailable or insufficient to handle the data flow, the local hard disk is spun up and temporarily used as the primary storage for reads and writes. When necessary and possible, the data on both storage locations is synchronized.Type: GrantFiled: October 24, 2007Date of Patent: October 11, 2011Assignee: International Business Machines CorporationInventor: Nikolai Joukov
-
Publication number: 20110231455Abstract: A file system interface is simulated out of at least a portion of a dormant computer system. File-based discovery is performed on the simulated file system interface to obtain a detailed inventory of at least the portion of the dormant computer system. The detailed inventory includes one or more of software profiles of at least the portion of the dormant computer system, software instances of at least the portion of the dormant computer system, services of at least the portion of the dormant computer system, and data objects used by the services.Type: ApplicationFiled: March 18, 2010Publication date: September 22, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nikolai A. Joukov, Birgit Pfitzmann, Shaya Potter, Harigovind V. Ramasamy
-
Patent number: 8005781Abstract: A method and a system for relating of a value network analysis of a mission to a knowledge base of dependencies of data objects, applications and information technology resources required for achieving of such mission, such method used for optimization of provisioning for information technology resources and for prioritizing of control of data and application security and integrity of such mission.Type: GrantFiled: June 9, 2008Date of Patent: August 23, 2011Assignee: International Business Machines CorporationInventors: Murthy V. Devarakonda, Nikolai Joukov, Manoj Kumar, Konstantinos Magoutis, Wlodek Wlodzimierz Zadrozny
-
Publication number: 20110196984Abstract: A system and method for parallel discovery includes grouping a set of nodes including redundant information. After a first discovery stage, a portion of the set of nodes is selected to perform an additional discovery stage. The additional discovery stage is performed with the portion of the set of nodes where each node makes a decision whether to perform the additional stage or not.Type: ApplicationFiled: February 9, 2010Publication date: August 11, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Nikolai A. Joukov
-
Publication number: 20110196959Abstract: The present invention describes a method and system for discovering of server devices. The system and method receive a list of known server devices. The system and method obtain middleware configuration data and/or log files for each of the known server devices in the list. The system and method derives dependencies on at least one other server device from the middleware configuration data and/or log files. The system and method determines whether the at least one other server device is a new server device not included in the list. Thus, the system and method discovers the new server device upon determining that the at least one other server device is not included in the list.Type: ApplicationFiled: February 9, 2010Publication date: August 11, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Murthy V. Devarakonda, Nikolai A. Joukov, Konstantinos Magoutis, Norbert G. Vogl
-
Publication number: 20110191454Abstract: The present invention includes a computing system for discovering a physical location of a physical server device in a datacenter. The computing system obtains at least one physical property of the physical server device pertaining to the physical location of the physical server device. The computing system acquires at least one logical property of the physical server device pertaining to a logical server name of the physical server device. The computing system correlates the at least one physical property and the at least one logical property. Thereby, the computing system matches the logical server name to the physical location.Type: ApplicationFiled: February 2, 2010Publication date: August 4, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Nikolai A. Joukov
-
Patent number: 7945613Abstract: A methodology is presented for discovering and storing end-to-end associations between different types of entities in a system configuration model of a distributed middleware system. First associations are determined, at each distributed system tier, between instances of data and data-container configuration elements. Those first associations point to logical subdivision of a data service that is directly responsible for implementing an instance of data. Second associations are determined, at said each distributed system tier, between said data-container configuration elements and a server infrastructure. Said second associations point to a server infrastructure that hosts said data-container configuration elements. Third associations are composed, within said each distributed system tier, between said instances of data and said server infrastructure, using said first associations and said second associations.Type: GrantFiled: December 5, 2007Date of Patent: May 17, 2011Assignee: International Business Machines CorporationInventors: Murthy V. Devarakonda, Nikolai Joukov, Hui Lei, Konstantinos Magoutis, Norbert G. Vogl
-
Publication number: 20110107327Abstract: The present invention describes a method and system for preparing a migration and consolidation of at least one source application to be migrated to or consolidated in at least one heterogeneous server device. A computing system selects at least one prospective target platform component based on an evaluation of at least one source platform component, a requirement of the at least one source application, and a compatibility and an affinity of the at least one prospective target platform component. The computing system collects first metadata of the at least one source platform component and the at least one prospective target platform component. The computing system collects second metadata associated with the migration and consolidation. The computing system groups the first metadata and the second metadata into a RFM (Request For Migration). The computing system prepares and configures a final target platform in accordance with the RFM.Type: ApplicationFiled: October 29, 2009Publication date: May 5, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric J. Barkie, James R. S. Barros, II, Kamal Bhattacharya, Karen Cheng, Robert Filepp, Kevin D. Galloway, Nikolai Joukov, Jing Luo, Colm V. Malone, Birgit M. Pfitzmann, Brian L. Peterson, Harigovind V. Ramasamy, Kewei Sun, Norbert G. Vogl, David L. Westerman, Christopher C. Young
-
Publication number: 20110055816Abstract: A system and method of deriving software use and software data object characteristics determine one or more locations on one or more computer storage devices where one or more configuration and data files associated with computer software components are stored, and obtain one or more attributes associated with said one or more computer software components. One or more commands associated with said one or more computer software components may be issued and one or more related information associated with said one or more software computer components resulting from issuing one or more commands may be collected. The related information and the one or more attributes may be mapped to the computer software components to derive information about the computer software component use and data object use characteristics.Type: ApplicationFiled: August 28, 2009Publication date: March 3, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nikolai A. Joukov, Norbert G. Vogl
-
Publication number: 20110055806Abstract: A system and method of discovering one or more program variable values may extract an abstract interpretation of a program variable used in a computer program, locate installation-specific repositories associated with the computer program, parse the located installation-specific repositories and extract one or more configuration parameters, and substitute the one or more configuration parameters into the extracted abstract interpretation.Type: ApplicationFiled: September 3, 2009Publication date: March 3, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sergej Chicherin, Nikolai A. Joukov, Birgit Pfitzmann, Marco Pistoia, Vasily Tarasov, Takaaki Tateishi, Norbert G. Vogl
-
Publication number: 20110029946Abstract: Calls to stop functions are identified in a computer program file. The stop functions are functions that interact with external resources. Parameters of the calls to the stop functions that are references to the external resources are identified. An analysis is performed over the computer program file to find out possible values of the parameters of the calls.Type: ApplicationFiled: July 29, 2009Publication date: February 3, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nikolai A. Joukov, Birgit M. Pfitzmann, Marco Pistoia, Vasily Tarasov, Takaaki Tateishi, Norbert G. Vogl
-
Publication number: 20100319060Abstract: A method and system for discovering dependencies, configurations and utilizations among IT resources are disclosed. A discovery team writes a prediscovery script without requesting credentials and sends it to a system administrator (SA) who already has necessary credentials to execute the prediscovery script. Then, the SA reviews the prediscovery script and executes the prediscovery script on a target server. While or after executing the prediscovery script, the target server generates a result of an execution of the prediscovery script and provides the result to an analysis system. The analysis system analyzes and parses the result and generates a user-friendly data (e.g., graph or spreadsheet) that represents the result. Then, the analysis system provides the user-friendly data to the discovery team. The analysis system does not require credentials and does not directly communicate with the target server except receiving the result of the executed prediscovery script from the target server.Type: ApplicationFiled: June 16, 2009Publication date: December 16, 2010Applicant: International Business Machines CorporationInventors: Louis E. Aiken, John K. Baker, Kamal Bhattacharya, Robert P. Boettcher, Murthy V. Devarakonda, Nikolai A. Joukov, Timothy P. Kane, SR., Steve Lee, Matthew A. Markley, Birgit M. Pfitzmann, Michael Tacci, Norbert G. Vogl, Anthony G.D. Walker
-
Publication number: 20090307743Abstract: A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed.Type: ApplicationFiled: June 6, 2008Publication date: December 10, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alain C. Azagury, Murthy V. Devarakonda, Nikolai Joukov, Manoj Kumar, Konstantinos Magoutis, Birgit M. Pfitzmann, Norbert G. Vogl