Patents by Inventor Salman A. Baset
Salman A. Baset has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10983778Abstract: A method for updating an application executing on a virtual machine includes replicating the virtual machine to produce a replica, applying an update to the replica that is scheduled to be made to the virtual machine, in parallel with the applying, updating one of the virtual machine and the replica so that a state of the virtual machine matches a state of the replica, and continuing execution of the application on one of the virtual machine and the replica.Type: GrantFiled: March 28, 2019Date of Patent: April 20, 2021Assignee: International Business Machines CorporationInventors: Salman A. Baset, Hai Huang, Manas Singh, Byung Chul Tak, Chunqiang Tang, Long Wang
-
Patent number: 10761873Abstract: Evaluating the performance of an application when migrated from a first environment in which the application is currently executing to a different second environment includes generating a configuration file using data obtained from the application executing in the first environment, installing the configuration file in a virtual machine residing in the second environment, launching the application in the virtual machine after the installing, and obtaining a metric indicative of the performance from the virtual machine.Type: GrantFiled: December 19, 2017Date of Patent: September 1, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Salman A. Baset, Hai Huang, Byung Chul Tak, Chunqiang Tang, Long Wang
-
Patent number: 10423408Abstract: A computer system, method, and computer readable product are provided for identifying and isolating library code that has been obfuscated in software applications. A call graph is created for the execution of at least one module of preexisting library code within a bundle of software modules through either static analysis of the software code or dynamic analysis of the executing code, and then one or more anchor points are devised based upon the call graph that are indicative of the preexisting library code. Then a bundle of software modules can be analyzed or its execution monitored to determine if a discrete module of library code is present in the executing bundle based upon the modules' interaction with the one or more anchor points, and the discrete module of library code in the executing bundle can be identified as a module of preexisting library code.Type: GrantFiled: June 2, 2016Date of Patent: September 24, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Salman A. Baset, Shih-Wei Li, Omer Tripp, Philippe Suter
-
Patent number: 10397370Abstract: In an approach for determining optimal performance-related configurations of applications by analyzing peer data, a processor monitors instances of an application, wherein the instances of the application are running on a plurality of devices. A processor receives data related to: configuration parameters of the application, system parameters of the plurality of devices, and performance metrics of the plurality of devices. A processor determines correlation and dependencies between the configuration parameters with associated system parameters, using: an all pair analysis and a Pearson product-moment correlation coefficient (PPMCC). A processor determines dependencies between the configuration parameters with performance metrics. A processor recommends to a user, configuration settings of the application, based on the analysis of the data.Type: GrantFiled: September 11, 2017Date of Patent: August 27, 2019Assignee: International Business Machines CorporationInventors: Byung Chul Tak, Salman A. Baset, Sahil Suneja, Canturk Isci
-
Patent number: 10360087Abstract: A method for recommending a web application programming interface (API) includes: a cloud computing service retrieving test source code from a remote computer of the developer; the cloud computing service determining whether a call to a first web API among a plurality of web APIs is present in the test source code; and when it is determined that the call is present, the cloud computing service reading at least one log file to extract information about at least one application that has used the first web API; the cloud computing service determining a first quality of the first web API from the log file; and the cloud computing service sending a message to the remote computer recommending a second web API among the web APIs having a second quality higher than the first quality.Type: GrantFiled: October 27, 2017Date of Patent: July 23, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Philippe Suter, Salman A. Baset, John E. Wittern
-
Publication number: 20190220269Abstract: A method for updating an application executing on a virtual machine includes replicating the virtual machine to produce a replica, applying an update to the replica that is scheduled to be made to the virtual machine, in parallel with the applying, updating one of the virtual machine and the replica so that a state of the virtual machine matches a state of the replica, and continuing execution of the application on one of the virtual machine and the replica.Type: ApplicationFiled: March 28, 2019Publication date: July 18, 2019Inventors: Salman A. Baset, Hai Huang, Manas Singh, Byung Chul Tak, Chunqiang Tang, Long Wang
-
Patent number: 10296745Abstract: A method and system of determining a vulnerability of software. Libraries are downloaded and stored in a database. For each library, a set of features are extracted and stored in a library index table of the database. For each library, it is determined whether it poses a security concern and flagged accordingly in the library index table. Applications are downloaded and stored in the database. For each application a set of features are extracted and stored in an application index table of the database. For each application, the set of features of the application of the application are compared to the set of features of each of the libraries in the library index table to identify which libraries in the library index table are associated with the application. For each application, a name of the application and names of the associated libraries are stored in a vulnerability reference table in the database.Type: GrantFiled: June 23, 2016Date of Patent: May 21, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Salman A. Baset, Philippe Suter, Omer Tripp
-
Patent number: 10296320Abstract: A method for updating an application executing on a virtual machine includes replicating the virtual machine to produce a replica, applying an update to the replica that is scheduled to be made to the virtual machine, in parallel with the applying, updating one of the virtual machine and the replica so that a state of the virtual machine matches a state of the replica, and continuing execution of the application on one of the virtual machine and the replica.Type: GrantFiled: September 10, 2014Date of Patent: May 21, 2019Assignee: International Business Machines CorporationInventors: Salman A. Baset, Hai Huang, Manas Singh, Byung Chul Tak, Chunqiang Tang, Long Wang
-
Publication number: 20190129773Abstract: A method for recommending a web application programming interface (API) includes: a cloud computing service retrieving test source code from a remote computer of the developer; the cloud computing service determining whether a call to a first web API among a plurality of web APIs is present in the test source code; and when it is determined that the call is present, the cloud computing service reading at least one log file to extract information about at least one application that has used the first web API; the cloud computing service determining a first quality of the first web API from the log file; and the cloud computing service sending a message to the remote computer recommending a second web API among the web APIs having a second quality higher than the first quality.Type: ApplicationFiled: October 27, 2017Publication date: May 2, 2019Inventors: PHILIPPE SUTER, Salman A. Baset, John E. Wittern
-
Publication number: 20190082033Abstract: In an approach for determining optimal performance-related configurations of applications by analyzing peer data, a processor monitors instances of an application, wherein the instances of the application are running on a plurality of devices. A processor receives data related to: configuration parameters of the application, system parameters of the plurality of devices, and performance metrics of the plurality of devices. A processor determines correlation and dependencies between the configuration parameters with associated system parameters, using: an all pair analysis and a Pearson product-moment correlation coefficient (PPMCC). A processor determines dependencies between the configuration parameters with performance metrics. A processor recommends to a user, configuration settings of the application, based on the analysis of the data.Type: ApplicationFiled: September 11, 2017Publication date: March 14, 2019Inventors: Byung Chul Tak, Salman A. Baset, Sahil Suneja, Canturk Isci
-
Patent number: 10223329Abstract: An approach for ontological policy based data collection, processing, and negotiation for data in view of analytics is provided. The approach searches one or more data sources for data related to a data request. The approach collects data related to the data request from the one or more data sources. The approach determines whether one or more attributes generated from the data request match one or more descriptors associated with the data related to the data request. The approach creates one or more annotated ontologies for the data related to the data request. The approach displays a hierarchical visualization of the one or more annotated ontologies for the data related to the data request. The approach updates the one or more annotated ontologies for the data related to the data request based, at least in part, on an evaluation of the quality of the one or more data selections.Type: GrantFiled: March 20, 2015Date of Patent: March 5, 2019Assignee: International Business Machines CorporationInventors: Salman A. Baset, Yu Deng, Minkyong Kim, Alla Segal, Charles O. Schulz, Anca Sailer, Long Wang
-
Patent number: 10171371Abstract: Systems and methods are provided to support service management in cloud computing networks. For example, a method for managing a computing platform includes provisioning a plurality of virtual machines across a plurality of computing nodes of a computing platform, wherein the provisioned virtual machines are configured to execute service workloads to provide one or more services to customers, and utilizing one or more of the provisioned virtual machines which execute the service workloads to further perform service management operations for managing the computing platform. The service management operations for managing the computing platform include, e.g., mediation and rating operations for revenue management of the computing platform.Type: GrantFiled: September 30, 2015Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Ali Anwar, Salman A. Baset, Andrzej P. Kochut, Hui Lei, Anca Sailer, Alla Segal
-
Patent number: 10031735Abstract: A method of securely deploying an application in a cloud computing platform includes receiving component composition files that define configurations of application components included the application, and receiving an application composition file that defines a connection scheme between the application components. The method further includes retrieving default component configuration files that satisfy requirements of the application components. The method further includes executing functions corresponding to extension keywords included in the component composition files to modify default parameters in the default component configuration files, and deploying the application in the cloud computing platform based on the modified default component configuration files and the connection scheme defined by the application composition file.Type: GrantFiled: September 30, 2016Date of Patent: July 24, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Salman A. Baset, Imani N. Palmer
-
Patent number: 9998561Abstract: Systems and articles of manufacture for enabling access to user-specified and/or user-chosen content via remote third-party systems include communicating with a content provider via use of one or more user credentials, wherein the content provider maintains a list of user content choices and one or more preferences for content, wherein the content is generated by the user and/or by the content provider and/or by one or more other users, automatically downloading an amount of user-specified and/or user-chosen content from the list of user content choices and one or more preferences to a primary enterprise system and/or a secondary enterprise system in conjunction with an interaction between the user and the primary enterprise system, and providing access to the downloaded user-specified and/or user-chosen content to the user in conjunction with an interaction between the user and the secondary enterprise system, the content provider and/or the primary enterprise system.Type: GrantFiled: August 14, 2013Date of Patent: June 12, 2018Assignee: International Business Machines CorporationInventors: Salman A. Baset, Sambit Sahu
-
Publication number: 20180121230Abstract: Evaluating the performance of an application when migrated from a first environment in which the application is currently executing to a different second environment includes generating a configuration file using data obtained from the application executing in the first environment, installing the configuration file in a virtual machine residing in the second environment, launching the application in the virtual machine after the installing, and obtaining a metric indicative of the performance from the virtual machine.Type: ApplicationFiled: December 19, 2017Publication date: May 3, 2018Inventors: Salman A. Baset, Hai Huang, Byung Chul Tak, Chunqiang Tang, Long Wang
-
Publication number: 20180095739Abstract: A method of securely deploying an application in a cloud computing platform includes receiving component composition files that define configurations of application components included the application, and receiving an application composition file that defines a connection scheme between the application components. The method further includes retrieving default component configuration files that satisfy requirements of the application components. The method further includes executing functions corresponding to extension keywords included in the component composition files to modify default parameters in the default component configuration files, and deploying the application in the cloud computing platform based on the modified default component configuration files and the connection scheme defined by the application composition file.Type: ApplicationFiled: September 30, 2016Publication date: April 5, 2018Inventors: SALMAN A. BASET, IMANI N. PALMER
-
Patent number: 9934055Abstract: Evaluating the performance of an application when migrated from a first environment in which the application is currently executing to a different second environment includes generating a configuration file using data obtained from the application executing in the first environment, installing the configuration file in a virtual machine residing in the second environment, launching the application in the virtual machine after the installing, and obtaining a metric indicative of the performance from the virtual machine.Type: GrantFiled: August 19, 2013Date of Patent: April 3, 2018Assignee: International Business Machines CorporationInventors: Salman A. Baset, Hai Huang, Byung Chul Tak, Chunqiang Tang, Long Wang
-
Patent number: 9934054Abstract: A method for evaluating the performance of an application when migrated from a first environment in which the application is currently executing to a different second environment includes generating a configuration file using data obtained from the application executing in the first environment, installing the configuration file in a virtual machine residing in the second environment, launching the application in the virtual machine after the installing, and obtaining a metric indicative of the performance from the virtual machine.Type: GrantFiled: December 14, 2012Date of Patent: April 3, 2018Assignee: International Business Machines CorporationInventors: Salman A. Baset, Hai Huang, Byung Chul Tak, Chunqiang Tang, Long Wang
-
Patent number: 9930139Abstract: Techniques for enabling access to user-specified and/or user-chosen content via remote third-party systems. A method includes communicating with a content provider via use of one or more user credentials, wherein the content provider maintains a list of user content choices and one or more preferences for content, wherein the content is generated by the user and/or by the content provider and/or by one or more other users, automatically downloading an amount of user-specified and/or user-chosen content from the list of user content choices and one or more preferences to a primary enterprise system and/or a secondary enterprise system in conjunction with an interaction between the user and the primary enterprise system, and providing access to the downloaded user-specified and/or user-chosen content to the user in conjunction with an interaction between the user and the secondary enterprise system, the content provider and/or the primary enterprise system.Type: GrantFiled: January 31, 2013Date of Patent: March 27, 2018Assignee: International Business Machines CorporationInventors: Salman A. Baset, Sambit Sahu
-
Publication number: 20170372072Abstract: A method and system of determining a vulnerability of software. Libraries are downloaded and stored in a database. For each library, a set of features are extracted and stored in a library index table of the database. For each library, it is determined whether it poses a security concern and flagged accordingly in the library index table. Applications are downloaded and stored in the database. For each application a set of features are extracted and stored in an application index table of the database. For each application, the set of features of the application of the application are compared to the set of features of each of the libraries in the library index table to identify which libraries in the library index table are associated with the application. For each application, a name of the application and names of the associated libraries are stored in a vulnerability reference table in the database.Type: ApplicationFiled: June 23, 2016Publication date: December 28, 2017Inventors: Salman A. Baset, Philippe Suter, Omer Tripp