Patents by Inventor Rafael C. S. Folco
Rafael C. S. Folco has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170371638Abstract: The method includes identifying, by one or more computer processors, a first container with first software stack and a valid multipath configuration, wherein the first software stack is a first path of the valid multipath configuration. The method further includes creating, by one or more computer processors, a second container, wherein the second container has the same rules as the first container. The method further includes creating, by one or more computer processes, a second software stack in the second container, wherein the software stack is a redundant software stack of the first software stack. The method further includes creating, by one or more computer processors, a second path from the first container to the second software stack, wherein the second path bypasses the first software stack.Type: ApplicationFiled: June 24, 2016Publication date: December 28, 2017Inventors: Rafael C.S. Folco, Breno H. Leitao, Desnes A. Nunes do Rosario, Jose F. Santiago Filho
-
Publication number: 20170322834Abstract: Embodiments of the present invention disclose a method, computer program product, and system for a method for a system for deploying compute instances for processing a workload. Receiving a workload to be processed by a computer and determining an architecture for a compute instance that is required to process the workload, wherein the compute instance is an instance of computer system being spawned from a computing device. Setting growth rules for the compute instance, wherein the growth rules determines when the number of compute instances needs to be increased or decreased and deploying the compute instance to process the workload. The computer monitors a demand for the deployed compute instance to process the workload and automatically increasing or decreasing the number of deployed compute instances, based on the monitored demand for the deployed compute instances and the growth rules for the compute instances.Type: ApplicationFiled: May 3, 2016Publication date: November 9, 2017Inventors: Rafael P. de Sene, Rafael C. S. Folco, Breno H. Leitão, Ricardo M. Matinata
-
Patent number: 9781565Abstract: A first set of data may be received indicating that an object of interest has been identified. A second set of data may be received indicating a first location of where the object of interest was identified. The first location may correspond to a geographical area. In response to the receiving of the first set of data and the second set of data, the first location may be associated with a first transceiver base station. In response to the associating, a first list of one or more mobile devices may be obtained that are within an active range of the first transceiver base station.Type: GrantFiled: June 1, 2016Date of Patent: October 3, 2017Assignee: International Business Machines CorporationInventors: Rafael C. S. Folco, Breno H. Leitao, Desnes A. Nunes do Rosario, Jose F. Santiago Filho
-
Patent number: 9703686Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.Type: GrantFiled: April 19, 2016Date of Patent: July 11, 2017Assignee: International Business Machines CorporationInventors: Tiago N. dos Santos, Rafael C. S. Folco, Breno H. Leitao
-
Publication number: 20170147382Abstract: A method, system, and computer program product are disclosed for creating an in-memory application image. Embodiments can include receiving an application from a storage. Embodiments can also include loading the received application into a memory storage pool. Embodiments can also include receiving an indication of a request to execute the in-memory application image on a first virtual machine of a plurality of virtual machines. Embodiments can also include receiving an indication to execute the in-memory application image on the first virtual machine. Embodiments can also include removing the in-memory application image from the memory storage pool, in response to the receiving the indication to execute the in-memory application. Embodiments can also include assigning the removed in-memory application image to the first virtual machine.Type: ApplicationFiled: September 16, 2016Publication date: May 25, 2017Inventors: Rafael C.S. Folco, Breno H. Leitão, Tiago N.d. Santos
-
Publication number: 20170147375Abstract: A method, system, and computer program product are disclosed for creating an in-memory application image. Embodiments can include receiving an application from a storage. Embodiments can also include loading the received application into a memory storage pool. Embodiments can also include receiving an indication of a request to execute the in-memory application image on a first virtual machine of a plurality of virtual machines. Embodiments can also include receiving an indication to execute the in-memory application image on the first virtual machine. Embodiments can also include removing the in-memory application image from the memory storage pool, in response to the receiving the indication to execute the in-memory application. Embodiments can also include assigning the removed in-memory application image to the first virtual machine.Type: ApplicationFiled: November 25, 2015Publication date: May 25, 2017Inventors: Rafael C.S. Folco, Breno H. Leitão, Tiago N.d. Santos
-
Publication number: 20170104718Abstract: A first computing system may identify a security threat located at least at a first virtual server. The first virtual server may be within a second computing system. The first computing system may provision, in response to the identifying, a first firewall associated with the first virtual server. The first firewall may include a rule to deny all communication transmitted from the first virtual server. The first computing system may execute, in response to the provisioning, a first repair operation to repair the first virtual server.Type: ApplicationFiled: October 9, 2015Publication date: April 13, 2017Inventors: Rafael C. S. Folco, Plinio A. S. Freire, Breno H. Leitao, Tiago N. d. Santos
-
Publication number: 20170104782Abstract: A first computing system may identify a security threat located at least at a first virtual server. The first virtual server may be within a second computing system. The first computing system may provision, in response to the identifying, a first firewall associated with the first virtual server. The first firewall may include a rule to deny all communication transmitted from the first virtual server. The first computing system may execute, in response to the provisioning, a first repair operation to repair the first virtual server.Type: ApplicationFiled: October 22, 2015Publication date: April 13, 2017Inventors: Rafael C. S. Folco, Plinio A. S. Freire, Breno H. Leitao, Tiago N. d. Santos
-
Publication number: 20160232079Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.Type: ApplicationFiled: April 19, 2016Publication date: August 11, 2016Inventors: Tiago N. dos Santos, Rafael C.S. Folco, Breno H. Leitao
-
Patent number: 9396100Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.Type: GrantFiled: December 5, 2014Date of Patent: July 19, 2016Assignee: International Business Machines CorporationInventors: Tiago N. dos Santos, Rafael C. S. Folco, Breno H. Leitao
-
Patent number: 9378124Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.Type: GrantFiled: September 8, 2015Date of Patent: June 28, 2016Assignee: International Business Machines CorporationInventors: Tiago N. dos Santos, Rafael C. S. Folco, Breno H. Leitao
-
Publication number: 20160162394Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.Type: ApplicationFiled: December 5, 2014Publication date: June 9, 2016Inventors: Tiago N. dos Santos, Rafael C.S. Folco, Breno H. Leitao
-
Publication number: 20160162395Abstract: In an approach for testing software, a computer receives a series of two or more revisions to a set of software code. The computer identifies modifications between the series of two or more revisions. The computer categorizes the series of two or more revisions into one or more categories of revisions based on the identified modifications. The computer tests at least one of the series of two or more revisions from at least one of the one or more categories of revisions.Type: ApplicationFiled: September 8, 2015Publication date: June 9, 2016Inventors: Tiago N. dos Santos, Rafael C.S. Folco, Breno H. Leitao
-
Publication number: 20160139970Abstract: As disclosed herein a method, executed by a computer, for providing improved multi-protocol traffic processing includes receiving a data packet, determining if a big processor is activated, deactivating a little processor and activating the big processor if the big processor is not activated and an overflow queue is full, and deactivating the big processor and activating the little processor if the big processor is activated and a current throughput for the big processor is below a first threshold or a sustained throughput for the big processor remains below a second threshold. The big and little processors may be co-located on a single integrated circuit. An overflow queue, managed with a token bucket algorithm, may be used to enable the little processor to handle short burst of data packet traffic. A computer program product and an apparatus corresponding to the described method are also disclosed herein.Type: ApplicationFiled: December 11, 2014Publication date: May 19, 2016Inventors: Murilo O. Araujo, Leonardo R. Augusto, Rafael C. S. Folco, Breno H. Leitao, Tiago N. Santos
-
Publication number: 20160140070Abstract: As disclosed herein a method, executed by a computer, for providing improved multi-protocol traffic processing includes receiving a data packet, determining if a big processor is activated, deactivating a little processor and activating the big processor if the big processor is not activated and an overflow queue is full, and deactivating the big processor and activating the little processor if the big processor is activated and a current throughput for the big processor is below a first threshold or a sustained throughput for the big processor remains below a second threshold. The big and little processors may be co-located on a single integrated circuit. An overflow queue, managed with a token bucket algorithm, may be used to enable the little processor to handle short burst of data packet traffic. A computer program product and an apparatus corresponding to the described method are also disclosed herein.Type: ApplicationFiled: November 19, 2014Publication date: May 19, 2016Inventors: Murilo O. Araujo, Leonardo R. Augusto, Rafael C. S. Folco, Breno H. Leitao, Tiago N. Santos
-
Publication number: 20160139963Abstract: As disclosed herein, a method, executed by a computer, includes comparing a current power consumption profile for a computing task with an historical power consumption profile, receiving a request for a computing resource, granting the request if the historical power consumption profile does not suggest a pending peak in the current power consumption profile or the historical power consumption profile indicates persistent consumption at a higher power level, and denying the request for the computing resource if the historical power consumption profile suggests a pending peak in the current power consumption profile and the historical power consumption profile indicates temporary consumption at the higher power level. Denying the request may include initiating an allocation timeout and subsequently ending the allocation timeout in response to a drop in a power consumption below a selected level. A computer system and computer program product corresponding to the method are also disclosed herein.Type: ApplicationFiled: November 19, 2014Publication date: May 19, 2016Inventors: Rafael C. S. Folco, Breno H. Leitao, Thiago C. Rotta, Tiago N. Santos
-
Patent number: 9170976Abstract: A mechanism is provided for resource management. A first network interface card in a set of network interface cards receives network data from one or more servers in a set of servers. Responsive to the first network interface card determining that a first threshold has been met indicating that an overload condition is imminent in the first network interface card, the first network interface card sends a resume signal to a second network interface card in the set of network interface cards. Responsive to the first network interface card determining that a second threshold is being met indicating that the overload condition has been met in the first network interface card, the first network interface card delegates the network data that caused the overload condition to be met to the second interface card.Type: GrantFiled: January 3, 2013Date of Patent: October 27, 2015Assignee: International Business Machines CorporationInventors: Rafael C. S. Folco, Breno H. Leitao, Tiago N. D. Santos
-
Publication number: 20140373010Abstract: Embodiments of the present invention disclose a method, computer program product, and system for resource management for virtual machines. A computer receives information associated with one or more virtual machines, wherein the received information includes utilization information and workload information associated with each virtual machine of the one or more virtual machines. The computer analyzes the received information associated with the one or more virtual machines. The computer determines virtual machines for resource reallocation, wherein the determined virtual machines include one or more over-utilized virtual machines including at least one over-utilized resource. In another embodiment, the computer determines one or more under-utilized virtual machines, wherein the one or more under-utilized virtual machines include at least one under-utilized resource that corresponds to the determined one or more over-utilized resources.Type: ApplicationFiled: June 14, 2013Publication date: December 18, 2014Inventors: Rafael C.S. Folco, Breno H. Leitao, Tiago N. dos Santos
-
Publication number: 20140340405Abstract: The geographical distribution of “crowdable” objects (for example, people with cell phones) is predicted in the form of a pixelated predictive map. The predictive map is based upon an optical flow algorithm, as applied to two, or more, pixelated crowdable object distribution maps, respectively representing distribution at different points in time.Type: ApplicationFiled: May 15, 2013Publication date: November 20, 2014Applicant: International Business Machines CorporationInventors: Tiago N. dos Santos, Rafael C. S. Folco, Breno H. Leitao
-
Publication number: 20140189173Abstract: A mechanism is provided for resource management. A first network interface card in a set of network interface cards receives network data from one or more servers in a set of servers. Responsive to the first network interface card determining that a first threshold has been met indicating that an overload condition is imminent in the first network interface card, the first network interface card sends a resume signal to a second network interface card in the set of network interface cards. Responsive to the first network interface card determining that a second threshold is being met indicating that the overload condition has been met in the first network interface card, the first network interface card delegates the network data that caused the overload condition to be met to the second interface card.Type: ApplicationFiled: January 3, 2013Publication date: July 3, 2014Applicant: International Business Machines CorporationInventors: Rafael C. S. Folco, Breno H. Leitao, Tiago N. D. Santos