Patents by Inventor Rania Y. Khalaf
Rania Y. Khalaf has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10904321Abstract: Various embodiments migrate a legacy application to a multi-tenant computing environment. In one embodiment, at least one virtualized computing container is instantiated on a host system in a multi-tenant computing environment. An instance of the legacy application is executed within the virtualized computing container. The legacy application having been initially configured to run on premise and serve one tenant at a time. The virtualized computing container securely isolates the executing instance of the legacy application from other executing instances of the legacy application. At least one request received from a first client is sent to the instance of the legacy application executing within the virtualized computing container. The virtualized computing container is quiesced based on at least one quiescing criterion having been satisfied by the instance of the legacy application.Type: GrantFiled: March 27, 2018Date of Patent: January 26, 2021Assignee: International Business Machines CorporationInventors: Rania Y. Khalaf, Vinod Muthusamy, David E. Shepard, Aleksander Slominski
-
Publication number: 20180213029Abstract: Various embodiments migrate a legacy application to a multi-tenant computing environment. In one embodiment, at least one virtualized computing container is instantiated on a host system in a multi-tenant computing environment. An instance of the legacy application is executed within the virtualized computing container. The legacy application having been initially configured to run on premise and serve one tenant at a time. The virtualized computing container securely isolates the executing instance of the legacy application from other executing instances of the legacy application. At least one request received from a first client is sent to the instance of the legacy application executing within the virtualized computing container. The virtualized computing container is quiesced based on at least one quiescing criterion having been satisfied by the instance of the legacy application.Type: ApplicationFiled: March 27, 2018Publication date: July 26, 2018Inventors: Rania Y. KHALAF, Vinod MUTHUSAMY, David E. Shepard, Aleksander SLOMINSKI
-
Patent number: 9973571Abstract: Various embodiments migrate a legacy application to a multi-tenant computing environment. In one embodiment, at least one virtualized computing container is instantiated on a host system in a multi-tenant computing environment. An instance of the legacy application is executed within the virtualized computing container. The legacy application having been initially configured to run on premise and serve one tenant at a time. The virtualized computing container securely isolates the executing instance of the legacy application from other executing instances of the legacy application. At least one request received from a first client is sent to the instance of the legacy application executing within the virtualized computing container. The virtualized computing container is quiesced based on at least one quiescing criterion having been satisfied by the instance of the legacy application.Type: GrantFiled: June 24, 2015Date of Patent: May 15, 2018Assignee: International Business Machines CorporationInventors: Rania Y. Khalaf, Vinod Muthusamy, David E. Shepard, Aleksander Slominski
-
Patent number: 9954936Abstract: Various embodiments migrate a legacy application to a multi-tenant computing environment. In one embodiment, at least one virtualized computing container is instantiated on a host system in a multi-tenant computing environment. An instance of the legacy application is executed within the virtualized computing container. The legacy application having been initially configured to run on premise and serve one tenant at a time. The virtualized computing container securely isolates the executing instance of the legacy application from other executing instances of the legacy application. At least one request received from a first client is sent to the instance of the legacy application executing within the virtualized computing container. The virtualized computing container is quiesced based on at least one quiescing criterion having been satisfied by the instance of the legacy application.Type: GrantFiled: March 2, 2015Date of Patent: April 24, 2018Assignee: International Business Machines CorporationInventors: Rania Y. Khalaf, Vinod Muthusamy, David E. Shepard, Aleksander Slominski
-
Publication number: 20160261684Abstract: Various embodiments migrate a legacy application to a multi-tenant computing environment. In one embodiment, at least one virtualized computing container is instantiated on a host system in a multi-tenant computing environment. An instance of the legacy application is executed within the virtualized computing container. The legacy application having been initially configured to run on premise and serve one tenant at a time. The virtualized computing container securely isolates the executing instance of the legacy application from other executing instances of the legacy application. At least one request received from a first client is sent to the instance of the legacy application executing within the virtualized computing container. The virtualized computing container is quiesced based on at least one quiescing criterion having been satisfied by the instance of the legacy application.Type: ApplicationFiled: March 2, 2015Publication date: September 8, 2016Inventors: Rania Y. KHALAF, Vinod MUTHUSAMY, David E. Shepard, Aleksander SLOMINSKI
-
Publication number: 20160261716Abstract: Various embodiments migrate a legacy application to a multi-tenant computing environment. In one embodiment, at least one virtualized computing container is instantiated on a host system in a multi-tenant computing environment. An instance of the legacy application is executed within the virtualized computing container. The legacy application having been initially configured to run on premise and serve one tenant at a time. The virtualized computing container securely isolates the executing instance of the legacy application from other executing instances of the legacy application. At least one request received from a first client is sent to the instance of the legacy application executing within the virtualized computing container. The virtualized computing container is quiesced based on at least one quiescing criterion having been satisfied by the instance of the legacy application.Type: ApplicationFiled: June 24, 2015Publication date: September 8, 2016Applicant: International Business Machines CorporationInventors: Rania Y. KHALAF, Vinod MUTHUSAMY, David E. Shepard, Aleksander SLOMINSKI
-
Patent number: 9258125Abstract: Methods, systems, and products are disclosed in which generating evidence of web services transactions are provided generally by receiving in an ultimate recipient web service from an initial sender a request, the request containing a proof of message origin (‘PMO’). The PMO contains an element addressed to the ultimate recipient web service and the element bears a first signature, the first signature having a value. Embodiments also include authenticating the identity of the initial sender; creating a proof of message receipt (‘PMR’) including signing the value of the first signature; sending the PMR to the initial sender, receiving, by the initial sender, the PMR; and saving, by the initial sender, the PMR.Type: GrantFiled: October 6, 2005Date of Patent: February 9, 2016Assignee: International Business Machines CorporationInventors: Paul R. Bunter, Ralph A. Hertlein, Sreedhar Janaswamy, Rania Y. Khalaf, Keeranoor G. Kumar, Michael McIntosh, Anthony J. Nadalin, Shishir Saxena, Ralph P. Williams
-
Patent number: 9195955Abstract: Embodiments relate to determining a process outcome based on a computed probability and altering the path of a process instance based on an expediting rule. An aspect includes executing, by a processing device, a process instance in a process diagram, which includes a plurality of process steps. A condition associated with a first process step is identified. An outcome for the first process step is then determined based on a computed probability. Accordingly, the first process step is bypassed and the process instance is branched to a second process step based on an expediting rule. The expediting rule includes the condition and a branching action according to a selected outcome.Type: GrantFiled: May 13, 2013Date of Patent: November 24, 2015Assignee: International Business Machines CorporationInventors: Philippe Bonnard, Steven J. Demuth, Rania Y. Khalaf, Geetika T. Lakshmanan
-
Patent number: 9189649Abstract: A method, system and computer program product for security model for workflows aggregating third party secure services. In one embodiment, a workflow model described in a workflow language is provided and configured to declare security requirements of a composite application integrating protected data from two or more external network resources. The method also incorporates providing an authentication service executing on at least one secure server computer. The authentication service is configured to conduct user authentication and authorization to access the protected data at the external network resources on behalf of the composite application executing on at least one host server computer according to the workflow language.Type: GrantFiled: June 25, 2010Date of Patent: November 17, 2015Assignee: International Business Machines CorporationInventors: Paula K Austel, Suresh Chari, Francisco Curbera, Matthew J. Duftler, Rania Y. Khalaf, Florian F. Rosenberg
-
Patent number: 9189763Abstract: Embodiments relate to determining a process outcome based on a computed probability and altering the path of a process instance based on an expediting rule. An aspect includes executing, by a processing device, a process instance in a process diagram, which includes a plurality of process steps. A condition associated with a first process step is identified. An outcome for the first process step is then determined based on a computed probability. Accordingly, the first process step is bypassed and the process instance is branched to a second process step based on an expediting rule. The expediting rule includes the condition and a branching action according to a selected outcome.Type: GrantFiled: April 30, 2013Date of Patent: November 17, 2015Assignee: International Business Machines CorporationInventors: Philippe Bonnard, Steven J. Demuth, Rania Y. Khalaf, Geetika T. Lakshmanan
-
Publication number: 20140324759Abstract: Embodiments relate to determining a process outcome based on a computed probability and altering the path of a process instance based on an expediting rule. An aspect includes executing, by a processing device, a process instance in a process diagram, which includes a plurality of process steps. A condition associated with a first process step is identified. An outcome for the first process step is then determined based on a computed probability. Accordingly, the first process step is bypassed and the process instance is branched to a second process step based on an expediting rule. The expediting rule includes the condition and a branching action according to a selected outcome.Type: ApplicationFiled: April 30, 2013Publication date: October 30, 2014Applicant: International Business Machines CorporationInventors: Philippe Bonnard, Steven J. Demuth, Rania Y. Khalaf, Geetika T. Lakshmanan
-
Publication number: 20140324516Abstract: Embodiments relate to determining a process outcome based on a computed probability and altering the path of a process instance based on an expediting rule. An aspect includes executing, by a processing device, a process instance in a process diagram, which includes a plurality of process steps. A condition associated with a first process step is identified. An outcome for the first process step is then determined based on a computed probability. Accordingly, the first process step is bypassed and the process instance is branched to a second process step based on an expediting rule. The expediting rule includes the condition and a branching action according to a selected outcome.Type: ApplicationFiled: May 13, 2013Publication date: October 30, 2014Applicant: International Business Machines CorporationInventors: Philippe Bonnard, Steven J. Demuth, Rania Y. Khalaf, Geetika T. Lakshmanan
-
Patent number: 8856809Abstract: A computer implemented method, apparatus, and computer usable program product for processing application code. In one embodiment, a call is received to invoke a set of methods of annotated application code. The annotated application code includes a set of annotations specifying a selection of the set of methods. A selected method from the set of methods is invoked in response to determining that the call is valid according to the set of annotations. Thereafter, a subsequent set of valid methods for execution is identified based upon an annotation associated with the selected method.Type: GrantFiled: March 19, 2008Date of Patent: October 7, 2014Assignee: International Business Machines CorporationInventors: Francisco Phelan Curbera, Matthew J. Duftler, Michael Levi Fraenkel, Rania Y. Khalaf, Axel Martens, Johannes Riemer, Gal Shachor
-
Publication number: 20130231978Abstract: A method, system and computer program product for determining health of a case. The method includes the steps of: obtaining at least one correlated trace from (i) task descriptions or (ii) data related to the task descriptions or a process instance; calculating at least one current metric using (i) the task descriptions, (ii) the data, (iii) the correlated trace or (iv) a first model; calculating at least one prognostic metric using a second model; and creating at least one combination metric from the current metric and the prognostic metric; where at least one of the steps is carried out using a computer device.Type: ApplicationFiled: March 1, 2012Publication date: September 5, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Francisco P. Curbera, Yurdaer N. Doganata, Rania Y. Khalaf, Geetika T. Lakshmanan, Axel Martens, Kevin P. McAuliffe, Nirmal K. Mukhi, Aleksander A. Slominski
-
Publication number: 20110321131Abstract: A method, system and computer program product for security model for workflows aggregating third party secure services. In one embodiment, a workflow model described in a workflow language is provided and configured to declare security requirements of a composite application integrating protected data from two or more external network resources. The method also incorporates providing an authentication service executing on at least one secure server computer. The authentication service is configured to conduct user authentication and authorization to access the protected data at the external network resources on behalf of the composite application executing on at least one host server computer according to the workflow language.Type: ApplicationFiled: June 25, 2010Publication date: December 29, 2011Applicant: International Business Machines CorporationInventors: Paula K. Austel, Suresh Chari, Francisco Curbera, Matthew J. Duftler, Rania Y. Khalaf, Florian F. Rosenberg
-
Publication number: 20090241128Abstract: A computer implemented method, apparatus, and computer usable program product for processing application code. In one embodiment, a call is received to invoke a set of methods of annotated application code. The annotated application code includes a set of annotations specifying a selection of the set of methods. A selected method from the set of methods is invoked in response to determining that the call is valid according to the set of annotations. Thereafter, a subsequent set of valid methods for execution is identified based upon an annotation associated with the selected method.Type: ApplicationFiled: March 19, 2008Publication date: September 24, 2009Applicant: International Business Machines CorporationInventors: Francisco Phelan Curbera, Matthew J. Duftler, Michael Levi Fraenkel, Rania Y. Khalaf, Axel Martens, Johannes Riemer, Gal Shachor
-
Publication number: 20020133811Abstract: Bean Scripting Components (BSC) is an eXtensible Markup-based (XML-based) language for defining and implementing JavaBeans components using any scripting language. The BSC language provides a first-class syntax for describing a JavaBeans component's properties, events and methods. JavaBeans components can be defined and implemented using any programming language that compiles to a Java class. Once compiled into Java, a BSC defined JavaBeans component is compatible with any other JavaBeans component implemented directly in Java itself.Type: ApplicationFiled: December 14, 2000Publication date: September 19, 2002Inventors: Matthew J. Duftler, Rania Y. Khalaf, Joseph J. Kesselman, Sanjiva Weerawarana