Patents by Inventor Soobaek Jang
Soobaek Jang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180181896Abstract: Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified. It will then be determined whether the set of computing resources are sufficient to process the workload request. If the set of computing resources are under-allocated (or are over-allocated), a resource scaling policy may be accessed. The set of computing resources may then be scaled based on the resource scaling policy, so that the workload request can be efficiently processed while maintaining compliance with the resource scaling policy.Type: ApplicationFiled: February 23, 2018Publication date: June 28, 2018Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang
-
Patent number: 9998490Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.Type: GrantFiled: June 26, 2017Date of Patent: June 12, 2018Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9973539Abstract: Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, computer code and data of an application is annotated with metadata defining a set of runtime policies for executing the computer code and data. Once a request is received to run the application, a set of parameters (e.g., geographic location) corresponding to the execution of the computer code and data of the application is dynamically determined, and compared to the runtime policies. The runtime policies for executing the computer code and data are then enforced at runtime. This includes either running the application, or preventing the running of the application in the case that the set of parameters corresponding to the execution of the computer code and data of the application do not satisfy the runtime policies.Type: GrantFiled: August 19, 2016Date of Patent: May 15, 2018Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9940595Abstract: Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified. It will then be determined whether the set of computing resources are sufficient to process the workload request. If the set of computing resources are under-allocated (or are over-allocated), a resource scaling policy may be accessed. The set of computing resources may then be scaled based on the resource scaling policy, so that the workload request can be efficiently processed while maintaining compliance with the resource scaling policy.Type: GrantFiled: January 6, 2015Date of Patent: April 10, 2018Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang
-
Patent number: 9935849Abstract: An approach for assessing a service offering selected by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, a network environment containing the service offering is monitored for a software configuration activity performed by the user. This software configuration activity is analyzed to identify the software application that is being configured. A set of provider-managed service offerings can be searched for any provider-managed service offering that contains an offered application corresponding to that of the software application. This managed service offering can be included in an alternative suggestion for the service offering.Type: GrantFiled: April 13, 2017Date of Patent: April 3, 2018Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9928623Abstract: According to embodiments of the present invention, one or more computer processors display unstructured data. One or more computer processors display a first chart that graphically represents at least a portion of the unstructured data. In response to the first chart failing to satisfy a user-defined criteria, one or more computer processors modifies the first chart to generate a second chart that graphically represents at least a portion of the unstructured data in a user-defined manner. In certain embodiments, the unstructured data includes information that does not have a pre-defined data model and/or is not organized in a pre-defined manner.Type: GrantFiled: September 12, 2014Date of Patent: March 27, 2018Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Soobaek Jang, Daniel C. Krook, Craig M. Trim
-
Patent number: 9838385Abstract: In general, embodiments of the present invention relate to password management. Specifically, a user selects a variable parameter rule from among a set of variable parameter rules. The variable parameter rule includes a set of variable parameter values. The user defines two or more static passwords and maps each static password to a variable parameter value. To access a protected source, the user must enter a valid password that matches one of the static passwords based on a current variable parameter value associated with the variable parameter rule.Type: GrantFiled: June 30, 2015Date of Patent: December 5, 2017Assignee: International Business Machines CorporationInventors: Lisa Seacat DeLuca, Soobaek Jang, Peter P. Rodriguez
-
Publication number: 20170329665Abstract: In one embodiment, a method for community content identification is provided. The method includes identifying one or more error messages from software running on a cloud instance. The method further includes determining relevance of content items of community content to the identified error messages. The method further includes assigning weights to the content items of the community content based on their determined relevance, wherein content items having high relevance to the identified error messages are assigned a higher weight than content items determined not relevant to the error messages and displaying content items according to the assigned weights.Type: ApplicationFiled: August 4, 2017Publication date: November 16, 2017Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Publication number: 20170322940Abstract: In one embodiment, a method for community content identification is provided. The method includes identifying one or more error messages from software running on a cloud instance. The method further includes determining relevance of content items of community content to the identified error messages. The method further includes assigning weights to the content items of the community content based on their determined relevance, wherein content items having high relevance to the identified error messages are assigned a higher weight than content items determined not relevant to the error messages and displaying content items according to the assigned weights.Type: ApplicationFiled: May 3, 2016Publication date: November 9, 2017Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9813423Abstract: A trust-based approach for authorizing computing resources in a networked computing environment is provided. Specifically, in a typical embodiment, a candidate computing resource (e.g., a virtual machine) will submit a request to join a network computing environment (“environment”). Based on the request, a message will be communicated to previously authorized/joined computing resources to poll/solicit their votes as to whether the candidate computing resource should be trusted/authorized in the environment. Based on the responses submitted by the polled computing resources, the candidate computing resource may be authorized or denied membership in the environment. If authorized, a permission level may be set (e.g., as recommended by the polled computing resources).Type: GrantFiled: February 26, 2013Date of Patent: November 7, 2017Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9811808Abstract: A method, computer program product, and system for providing notifications regarding electronic meetings is described. A set of one or more invitees for an online meeting is received, the set including a first invitee. A first status of the first invitee is identified, the first status indicating unavailability with respect to the electronic meeting. A change in status of the first invitee, after the end of the electronic meeting, to a second status indicating availability with respect to the electronic meeting is identified. A notification of the meeting is provided to the first invitee, based upon, at least in part, identifying the change in status.Type: GrantFiled: February 12, 2013Date of Patent: November 7, 2017Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat DeLuca, Soobaek Jang
-
Patent number: 9813748Abstract: Approaches described herein provide coordination of audio and/or video recording to minimize any gaps in coverage. In one approach, users of a distributed set of recording devices are invited to join a community with other similar users via a networked application in a loosely collaborative way. The recording coordination application substantially continuously monitors the state of the recording activities and coordinates the community of users to reduce any gaps in coverage.Type: GrantFiled: January 13, 2016Date of Patent: November 7, 2017Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Gregory J. Boss, Soobaek Jang, Randy A. Rendahl
-
Patent number: 9811370Abstract: Embodiments of the present invention provide an approach for provisioning a virtual resource instance (e.g., a server instance, etc.) in a networked computing environment (e.g., a cloud computing environment) based upon network characteristics (e.g., physical locations, email addresses/configurations, network connection types, internet protocol (IP) addresses, etc.) of a set (at least one) of intended end users of the virtual resource instance.Type: GrantFiled: November 4, 2015Date of Patent: November 7, 2017Assignee: International Business Machines CorporationInventors: Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Publication number: 20170295198Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.Type: ApplicationFiled: June 26, 2017Publication date: October 12, 2017Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9787717Abstract: An approach is provided for managing a message in a transfer from a computer. A level of security protecting the transfer of the data is determined. The level of security is determined to satisfy or not satisfy a threshold level. If the level of security satisfies the threshold level, the computer is connected and the message is transferred using the level of security. If the level of security does not satisfy the threshold level, then based on the level of security, an action to change the level of security is determined so that the changed level of security satisfies the threshold level. The action changes a method of network layer encryption for the transfer and/or a protocol specifying whether application layer encryption is utilized for the transfer. The action is executed to connect the computer and transfer the message using the changed level of security.Type: GrantFiled: January 11, 2017Date of Patent: October 10, 2017Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9781020Abstract: An approach for deploying and managing applications in a networked computing environment (e.g., a cloud computing environment). A user uploads an application for deployment in the networked computing environment. Metadata of the application is analyzed and compared to metadata of previously deployed applications. Using the comparison, a set of architectures used in conjunction with previously deployed application(s) with similar platform and middleware requirements are presented to a user. The user can select an architecture for deploying the application. The application is continuously monitored after deployment, and alternative architectures to improve the application can be presented to the user, if desired.Type: GrantFiled: May 25, 2016Date of Patent: October 3, 2017Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9781220Abstract: An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration.Type: GrantFiled: May 25, 2016Date of Patent: October 3, 2017Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9756060Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.Type: GrantFiled: November 15, 2016Date of Patent: September 5, 2017Assignee: International Business Machines CorporationInventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 9747891Abstract: A method for recommending the pronunciation of a name includes providing a plurality of audio records wherein the audio records include a set of audio records identifying the pronunciation of a common name. The method also includes analyzing the set of audio records identifying the pronunciation to determine the most frequent common pronunciation of the common name in the set of audio records. Once determined, the most frequent common pronunciation of the common name is presented to an end user.Type: GrantFiled: May 18, 2016Date of Patent: August 29, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat DeLuca, Soobaek Jang
-
Publication number: 20170222888Abstract: An approach for assessing a service offering selected by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, a network environment containing the service offering is monitored for a software configuration activity performed by the user. This software configuration activity is analyzed to identify the software application that is being configured. A set of provider-managed service offerings can be searched for any provider-managed service offering that contains an offered application corresponding to that of the software application. This managed service offering can be included in an alternative suggestion for the service offering.Type: ApplicationFiled: April 13, 2017Publication date: August 3, 2017Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook