Patents by Inventor Nikolaos Anerousis
Nikolaos Anerousis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190026472Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided.Type: ApplicationFiled: July 19, 2017Publication date: January 24, 2019Inventors: Constantin Mircea Adam, Nikolaos Anerousis, Jinho Hwang, Shripad Nadgowda, Maja Vukovic
-
Publication number: 20190019221Abstract: Content is selectively provided to users of mobile devices within a venue including an on-site wireless network. User authorization requests and/or user account registration data are transmitted to the on-site wireless network from mobile devices within the venue. Attributes such as user interests and professions, which comprise inferred user profiles, are obtained using the network traffic data. Identities of mobile devices are established based on a combination including two or more of network identifiers, mobile device signatures, and browser signatures. The inferred user profiles are correlated with the mobile device identities. The inferred user profiles are aggregated into user profile groups and then matched with a content provider's intended target profiles. Content is transmitted to the mobile devices corresponding to the intended target profiles and based on correlation of the inferred user profiles with identities of the devices.Type: ApplicationFiled: July 13, 2017Publication date: January 17, 2019Inventors: Bhavna Agrawal, Nikolaos Anerousis, Frank A. Schaffa, Jin Xiao
-
Publication number: 20190019222Abstract: Content is selectively provided to users of mobile devices within a venue including an on-site wireless network. User authorization requests and/or user account registration data are transmitted to the on-site wireless network from mobile devices within the venue. Attributes such as user interests and professions, which comprise inferred user profiles, are obtained using the network traffic data. Identities of mobile devices are established based on a combination including two or more of network identifiers, mobile device signatures, and browser signatures. The inferred user profiles are correlated with the mobile device identities. The inferred user profiles are aggregated into user profile groups and then matched with a content provider's intended target profiles. Content is transmitted to the mobile devices corresponding to the intended target profiles and based on correlation of the inferred user profiles with identities of the devices.Type: ApplicationFiled: December 31, 2017Publication date: January 17, 2019Inventors: Bhavna Agrawal, Nikolaos Anerousis, Frank A. Schaffa, Jin Xiao
-
Patent number: 10070328Abstract: Predictive network traffic management in a computer network. Information relating to events likely to have an adverse impact on network traffic, based on predefined parameters of network performance, is collected from the Internet. Details that may be used to predict network traffic density is extracted from the collected events information, and a predicted traffic density, based on the details is generated. Based on the predicted network traffic density, a traffic pattern is generated. A best-matching traffic pattern template to the generated traffic pattern is identified in a store of traffic pattern templates. Based on the best-matching traffic pattern template, bandwidth on the network is provisioned via an SDN controller.Type: GrantFiled: August 20, 2015Date of Patent: September 4, 2018Assignee: International Business Mahcines CorporationInventors: Nikolaos Anerousis, Jinho Hwang, Jin Xiao
-
Patent number: 9940466Abstract: A computer-implemented agent process running on a first computer automatically intercepts a command issued from the first computer to execute on a target computer prior to invocation of the command on the target computer. A server profile built for an application running on the target computer that supports the command may be retrieved. At least based on the server profile a risk enforcement policy is dynamically constructed. Based on the risk enforcement policy, one or more computer-executable enforcement actions to perform prior to sending the command to the target computer for execution is determined. Based on executing of one or more of the computer-executable enforcement actions, the command may be transmitted to execute on the target computer or prevented from executing on the target computer.Type: GrantFiled: December 7, 2016Date of Patent: April 10, 2018Assignee: International Business Machines CorporationInventors: Constantin M. Adam, Nikolaos Anerousis, Vysakh K. Chandran, Milton H. Hernandez, Debasisha K. Padhi, Yaoping Ruan, Fabio M. Tanada, Frederick Y.-F. Wu, Sai Zeng
-
Publication number: 20180062912Abstract: One or more embodiments identify server management actions for resolving problems associated with one or more nodes in information technology infrastructure. In one embodiment, a node-ticket record for an information processing node associated with at least one problem ticket is generated. A set of node-ticket clusters is queried based on the node-ticket record. Each of the set of node-ticket clusters maps a set of server management actions to set of historical node-ticket records associated with the node-ticket cluster. The set of server management actions was previously performed to resolve at least one operational problem associated with at least one information processing node. At least one set of server management actions associated with at least one of the set of node-ticket clusters corresponding to the node-ticket record within a given threshold is identified based on the querying.Type: ApplicationFiled: March 13, 2017Publication date: March 1, 2018Applicant: International Business Machines CorporationInventors: Nikolaos ANEROUSIS, Anuradha BHAMIDIPATY, Shang Q. GUO, Suman K. PATHAPATI, Daniela ROSU, Mitesh H. VASA, Anubha VERMA, Frederick WU, Sai ZENG
-
Patent number: 9882797Abstract: A software-defined passive optical network includes a set of optical network terminals, a set of passive optical network ports, and a plurality of splitters. Each of the optical network terminals is connected to a single one of the passive optical network ports through a given one of the splitters, and the network is divided into a plurality of areas, each of which is assigned a given fraction of the passive optical network ports. Passive optical network port utilization is monitored for each of the plurality of areas; for those of the areas determined to have passive optical network port overutilization, the number of the passive optical network ports assigned thereto is increased; and for those of the areas determined to have passive optical network port underutilization, the number of the passive optical network ports assigned thereto is reduced.Type: GrantFiled: October 28, 2015Date of Patent: January 30, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ahmed Amokrane, Nikolaos Anerousis, Jinho Hwang, Jin Xiao
-
Patent number: 9804879Abstract: Performing server virtual machine image migration and dependent server virtual machine image discovery in parallel is provided. Migration of a server virtual machine image that performs a workload is started to a client device via a network and, in parallel, an identity is continuously discovered of a set of dependent server virtual machine images corresponding to the server virtual machine image being migrated to the client device. In response to discovering the identity of the set of dependent server virtual machine images, a server migration pattern of the discovered set of dependent server virtual machine images is generated for the workload. A level of risk corresponding to migrating each dependent server virtual machine image of the discovered set of dependent server virtual machine images to the client device is calculated based on the server migration pattern of the discovered set of dependent server virtual machine images for the workload.Type: GrantFiled: May 14, 2015Date of Patent: October 31, 2017Assignee: International Business Machines CorporationInventors: Nikolaos Anerousis, Kun Bai, Hubertus Franke, Jinho Hwang, Jose E. Moreira, Maja Vukovic
-
Patent number: 9785461Abstract: Performing server virtual machine image migration and dependent server virtual machine image discovery in parallel is provided. Migration of a server virtual machine image that performs a workload is started to a client device via a network and, in parallel, an identity is continuously discovered of a set of dependent server virtual machine images corresponding to the server virtual machine image being migrated to the client device. In response to discovering the identity of the set of dependent server virtual machine images, a server migration pattern of the discovered set of dependent server virtual machine images is generated for the workload. A level of risk corresponding to migrating each dependent server virtual machine image of the discovered set of dependent server virtual machine images to the client device is calculated based on the server migration pattern of the discovered set of dependent server virtual machine images for the workload.Type: GrantFiled: June 19, 2015Date of Patent: October 10, 2017Assignee: International Business Machines CorporationInventors: Nikolaos Anerousis, Kun Bai, Hubertus Franke, Jinho Hwang, Jose E. Moreira, Maja Vukovic
-
Patent number: 9762438Abstract: Generating configuration images and deploying computer components in a computing environment that comprises a shared pool of configurable computing resources may be provided. Configuration templates from a plurality of repositories may be mined and classified. Base templates may be created that represent different service configurations based on the configuration templates classified into classes of different service configurations. For deploying a requested service with specified requirements, a plurality of candidate templates may be created based on the base templates that represent configurations for the requested service and configurations that meet the specified requirements. A target template from the plurality of candidate templates may be selected that most meets the specified requirements. Computer resources for the requested service may be deployed by running the target template.Type: GrantFiled: July 28, 2016Date of Patent: September 12, 2017Assignee: International Business Machines CorporationInventors: Nikolaos Anerousis, Jinho Hwang, Brian L. Peterson, John J. Rofrano
-
Patent number: 9755936Abstract: A software-defined passive optical network includes a set of optical network terminals, a set of passive optical network ports, and a plurality of splitters. Each of the optical network terminals is connected to a single one of the passive optical network ports through a given one of the splitters, and the network is divided into a plurality of areas, each of which is assigned a given fraction of the passive optical network ports. Passive optical network port utilization is monitored for each of the plurality of areas; for those of the areas determined to have passive optical network port overutilization, the number of the passive optical network ports assigned thereto is increased; and for those of the areas determined to have passive optical network port underutilization, the number of the passive optical network ports assigned thereto is reduced.Type: GrantFiled: December 9, 2015Date of Patent: September 5, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ahmed Amokrane, Nikolaos Anerousis, Jinho Hwang, Jin Xiao
-
Publication number: 20170177878Abstract: A computer-implemented agent process running on a first computer automatically intercepts a command issued from the first computer to execute on a target computer prior to invocation of the command on the target computer. A server profile built for an application running on the target computer that supports the command may be retrieved. At least based on the server profile a risk enforcement policy is dynamically constructed. Based on the risk enforcement policy, one or more computer-executable enforcement actions to perform prior to sending the command to the target computer for execution is determined. Based on executing of one or more of the computer-executable enforcement actions, the command may be transmitted to execute on the target computer or prevented from executing on the target computer.Type: ApplicationFiled: December 7, 2016Publication date: June 22, 2017Inventors: Constantin M. Adam, Nikolaos Anerousis, Vysakh K. Chandran, Milton H. Hernandez, Debasisha K. Padhi, Yaoping Ruan, Fabio M. Tanada, Frederick Y.-F. Wu, Sai Zeng
-
Publication number: 20170171024Abstract: Generating configuration images and deploying computer components in a computing environment that comprises a shared pool of configurable computing resources may be provided. Configuration templates from a plurality of repositories may be mined and classified. Base templates may be created that represent different service configurations based on the configuration templates classified into classes of different service configurations. For deploying a requested service with specified requirements, a plurality of candidate templates may be created based on the base templates that represent configurations for the requested service and configurations that meet the specified requirements. A target template from the plurality of candidate templates may be selected that most meets the specified requirements. Computer resources for the requested service may be deployed by running the target template.Type: ApplicationFiled: July 28, 2016Publication date: June 15, 2017Inventors: Nikolaos Anerousis, Jinho Hwang, Brian L. Peterson, John J. Rofrano
-
Patent number: 9667473Abstract: One or more embodiments identify server management actions for resolving problems associated with one or more nodes in information technology infrastructure. In one embodiment, a node-ticket record for an information processing node associated with at least one problem ticket is generated. A set of node-ticket clusters is queried based on the node-ticket record. Each of the set of node-ticket clusters maps a set of server management actions to set of historical node-ticket records associated with the node-ticket cluster. The set of server management actions was previously performed to resolve at least one operational problem associated with at least one information processing node. At least one set of server management actions associated with at least one of the set of node-ticket clusters corresponding to the node-ticket record within a given threshold is identified based on the querying.Type: GrantFiled: February 28, 2013Date of Patent: May 30, 2017Assignee: International Business Machines CorporationInventors: Nikolaos Anerousis, Anuradha Bhamidipaty, Shang Q. Guo, Suman K. Pathapati, Daniela Rosu, Mitesh H. Vasa, Anubha Verma, Frederick Wu, Sai Zeng
-
Patent number: 9584378Abstract: A computer-implemented agent process running on a first computer automatically intercepts a command issued from the first computer to execute on a target computer prior to invocation of the command on the target computer. A server profile built for an application running on the target computer that supports the command may be retrieved. At least based on the server profile a risk enforcement policy is dynamically constructed. Based on the risk enforcement policy, one or more computer-executable enforcement actions to perform prior to sending the command to the target computer for execution is determined. Based on executing of one or more of the computer-executable enforcement actions, the command may be transmitted to execute on the target computer or prevented from executing on the target computer.Type: GrantFiled: December 22, 2015Date of Patent: February 28, 2017Assignee: International Business Machines CorporationInventors: Constantin M Adam, Nikolaos Anerousis, Vysakh K. Chandran, Milton H. Hernandez, Debasisha K. Padhi, Yaoping Ruan, Fabio M. Tanada, Frederick Y.-F. Wu, Sai Zeng
-
Publication number: 20170054641Abstract: Predictive network traffic management in a computer network. Information relating to events likely to have an adverse impact on network traffic, based on predefined parameters of network performance, is collected from the Internet. Details that may be used to predict network traffic density is extracted from the collected events information, and a predicted traffic density, based on the details is generated. Based on the predicted network traffic density, a traffic pattern is generated. A best-matching traffic pattern template to the generated traffic pattern is identified in a store of traffic pattern templates. Based on the best-matching traffic pattern template, bandwidth on the network is provisioned via an SDN controller.Type: ApplicationFiled: August 20, 2015Publication date: February 23, 2017Inventors: Nikolaos Anerousis, Jinho Hwang, Jin Xiao
-
Publication number: 20160335105Abstract: Performing server virtual machine image migration and dependent server virtual machine image discovery in parallel is provided. Migration of a server virtual machine image that performs a workload is started to a client device via a network and, in parallel, an identity is continuously discovered of a set of dependent server virtual machine images corresponding to the server virtual machine image being migrated to the client device. In response to discovering the identity of the set of dependent server virtual machine images, a server migration pattern of the discovered set of dependent server virtual machine images is generated for the workload. A level of risk corresponding to migrating each dependent server virtual machine image of the discovered set of dependent server virtual machine images to the client device is calculated based on the server migration pattern of the discovered set of dependent server virtual machine images for the workload.Type: ApplicationFiled: June 19, 2015Publication date: November 17, 2016Inventors: Nikolaos Anerousis, Kun Bai, Hubertus Franke, Jinho Hwang, Jose E. Moreira, Maja Vukovic
-
Publication number: 20160337480Abstract: Performing server virtual machine image migration and dependent server virtual machine image discovery in parallel is provided. Migration of a server virtual machine image that performs a workload is started to a client device via a network and, in parallel, an identity is continuously discovered of a set of dependent server virtual machine images corresponding to the server virtual machine image being migrated to the client device. In response to discovering the identity of the set of dependent server virtual machine images, a server migration pattern of the discovered set of dependent server virtual machine images is generated for the workload. A level of risk corresponding to migrating each dependent server virtual machine image of the discovered set of dependent server virtual machine images to the client device is calculated based on the server migration pattern of the discovered set of dependent server virtual machine images for the workload.Type: ApplicationFiled: May 14, 2015Publication date: November 17, 2016Inventors: Nikolaos Anerousis, Kun Bai, Hubertus Franke, Jinho Hwang, Jose E. Moreira, Maja Vukovic
-
Patent number: 9426030Abstract: Generating configuration images and deploying computer components in a computing environment that comprises a shared pool of configurable computing resources may be provided. Configuration templates from a plurality of repositories may be mined and classified. Base templates may be created that represent different service configurations based on the configuration templates classified into classes of different service configurations. For deploying a requested service with specified requirements, a plurality of candidate templates may be created based on the base templates that represent configurations for the requested service and configurations that meet the specified requirements. A target template from the plurality of candidate templates may be selected that most meets the specified requirements. Computer resources for the requested service may be deployed by running the target template.Type: GrantFiled: December 11, 2015Date of Patent: August 23, 2016Assignee: International Business Machines CoporationInventors: Nikolaos Anerousis, Jinho Hwang, Brian L. Peterson, John J. Rofrano
-
Publication number: 20160127216Abstract: A software-defined passive optical network includes a set of optical network terminals, a set of passive optical network ports, and a plurality of splitters. Each of the optical network terminals is connected to a single one of the passive optical network ports through a given one of the splitters, and the network is divided into a plurality of areas, each of which is assigned a given fraction of the passive optical network ports. Passive optical network port utilization is monitored for each of the plurality of areas; for those of the areas determined to have passive optical network port overutilization, the number of the passive optical network ports assigned thereto is increased; and for those of the areas determined to have passive optical network port underutilization, the number of the passive optical network ports assigned thereto is reduced.Type: ApplicationFiled: October 28, 2015Publication date: May 5, 2016Inventors: Ahmed Amokrane, Nikolaos Anerousis, Jinho Hwang, Jin Xiao