Patents by Inventor Soobaek Jang

Soobaek Jang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180181896
    Abstract: Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified. It will then be determined whether the set of computing resources are sufficient to process the workload request. If the set of computing resources are under-allocated (or are over-allocated), a resource scaling policy may be accessed. The set of computing resources may then be scaled based on the resource scaling policy, so that the workload request can be efficiently processed while maintaining compliance with the resource scaling policy.
    Type: Application
    Filed: February 23, 2018
    Publication date: June 28, 2018
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 9998490
    Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.
    Type: Grant
    Filed: June 26, 2017
    Date of Patent: June 12, 2018
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9973539
    Abstract: Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, computer code and data of an application is annotated with metadata defining a set of runtime policies for executing the computer code and data. Once a request is received to run the application, a set of parameters (e.g., geographic location) corresponding to the execution of the computer code and data of the application is dynamically determined, and compared to the runtime policies. The runtime policies for executing the computer code and data are then enforced at runtime. This includes either running the application, or preventing the running of the application in the case that the set of parameters corresponding to the execution of the computer code and data of the application do not satisfy the runtime policies.
    Type: Grant
    Filed: August 19, 2016
    Date of Patent: May 15, 2018
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9940595
    Abstract: Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified. It will then be determined whether the set of computing resources are sufficient to process the workload request. If the set of computing resources are under-allocated (or are over-allocated), a resource scaling policy may be accessed. The set of computing resources may then be scaled based on the resource scaling policy, so that the workload request can be efficiently processed while maintaining compliance with the resource scaling policy.
    Type: Grant
    Filed: January 6, 2015
    Date of Patent: April 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 9935849
    Abstract: An approach for assessing a service offering selected by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, a network environment containing the service offering is monitored for a software configuration activity performed by the user. This software configuration activity is analyzed to identify the software application that is being configured. A set of provider-managed service offerings can be searched for any provider-managed service offering that contains an offered application corresponding to that of the software application. This managed service offering can be included in an alternative suggestion for the service offering.
    Type: Grant
    Filed: April 13, 2017
    Date of Patent: April 3, 2018
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9928623
    Abstract: According to embodiments of the present invention, one or more computer processors display unstructured data. One or more computer processors display a first chart that graphically represents at least a portion of the unstructured data. In response to the first chart failing to satisfy a user-defined criteria, one or more computer processors modifies the first chart to generate a second chart that graphically represents at least a portion of the unstructured data in a user-defined manner. In certain embodiments, the unstructured data includes information that does not have a pre-defined data model and/or is not organized in a pre-defined manner.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Soobaek Jang, Daniel C. Krook, Craig M. Trim
  • Patent number: 9838385
    Abstract: In general, embodiments of the present invention relate to password management. Specifically, a user selects a variable parameter rule from among a set of variable parameter rules. The variable parameter rule includes a set of variable parameter values. The user defines two or more static passwords and maps each static password to a variable parameter value. To access a protected source, the user must enter a valid password that matches one of the static passwords based on a current variable parameter value associated with the variable parameter rule.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: December 5, 2017
    Assignee: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Soobaek Jang, Peter P. Rodriguez
  • Publication number: 20170329665
    Abstract: In one embodiment, a method for community content identification is provided. The method includes identifying one or more error messages from software running on a cloud instance. The method further includes determining relevance of content items of community content to the identified error messages. The method further includes assigning weights to the content items of the community content based on their determined relevance, wherein content items having high relevance to the identified error messages are assigned a higher weight than content items determined not relevant to the error messages and displaying content items according to the assigned weights.
    Type: Application
    Filed: August 4, 2017
    Publication date: November 16, 2017
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20170322940
    Abstract: In one embodiment, a method for community content identification is provided. The method includes identifying one or more error messages from software running on a cloud instance. The method further includes determining relevance of content items of community content to the identified error messages. The method further includes assigning weights to the content items of the community content based on their determined relevance, wherein content items having high relevance to the identified error messages are assigned a higher weight than content items determined not relevant to the error messages and displaying content items according to the assigned weights.
    Type: Application
    Filed: May 3, 2016
    Publication date: November 9, 2017
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9813423
    Abstract: A trust-based approach for authorizing computing resources in a networked computing environment is provided. Specifically, in a typical embodiment, a candidate computing resource (e.g., a virtual machine) will submit a request to join a network computing environment (“environment”). Based on the request, a message will be communicated to previously authorized/joined computing resources to poll/solicit their votes as to whether the candidate computing resource should be trusted/authorized in the environment. Based on the responses submitted by the polled computing resources, the candidate computing resource may be authorized or denied membership in the environment. If authorized, a permission level may be set (e.g., as recommended by the polled computing resources).
    Type: Grant
    Filed: February 26, 2013
    Date of Patent: November 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9811808
    Abstract: A method, computer program product, and system for providing notifications regarding electronic meetings is described. A set of one or more invitees for an online meeting is received, the set including a first invitee. A first status of the first invitee is identified, the first status indicating unavailability with respect to the electronic meeting. A change in status of the first invitee, after the end of the electronic meeting, to a second status indicating availability with respect to the electronic meeting is identified. A notification of the meeting is provided to the first invitee, based upon, at least in part, identifying the change in status.
    Type: Grant
    Filed: February 12, 2013
    Date of Patent: November 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 9813748
    Abstract: Approaches described herein provide coordination of audio and/or video recording to minimize any gaps in coverage. In one approach, users of a distributed set of recording devices are invited to join a community with other similar users via a networked application in a loosely collaborative way. The recording coordination application substantially continuously monitors the state of the recording activities and coordinates the community of users to reduce any gaps in coverage.
    Type: Grant
    Filed: January 13, 2016
    Date of Patent: November 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Gregory J. Boss, Soobaek Jang, Randy A. Rendahl
  • Patent number: 9811370
    Abstract: Embodiments of the present invention provide an approach for provisioning a virtual resource instance (e.g., a server instance, etc.) in a networked computing environment (e.g., a cloud computing environment) based upon network characteristics (e.g., physical locations, email addresses/configurations, network connection types, internet protocol (IP) addresses, etc.) of a set (at least one) of intended end users of the virtual resource instance.
    Type: Grant
    Filed: November 4, 2015
    Date of Patent: November 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20170295198
    Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.
    Type: Application
    Filed: June 26, 2017
    Publication date: October 12, 2017
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9787717
    Abstract: An approach is provided for managing a message in a transfer from a computer. A level of security protecting the transfer of the data is determined. The level of security is determined to satisfy or not satisfy a threshold level. If the level of security satisfies the threshold level, the computer is connected and the message is transferred using the level of security. If the level of security does not satisfy the threshold level, then based on the level of security, an action to change the level of security is determined so that the changed level of security satisfies the threshold level. The action changes a method of network layer encryption for the transfer and/or a protocol specifying whether application layer encryption is utilized for the transfer. The action is executed to connect the computer and transfer the message using the changed level of security.
    Type: Grant
    Filed: January 11, 2017
    Date of Patent: October 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9781020
    Abstract: An approach for deploying and managing applications in a networked computing environment (e.g., a cloud computing environment). A user uploads an application for deployment in the networked computing environment. Metadata of the application is analyzed and compared to metadata of previously deployed applications. Using the comparison, a set of architectures used in conjunction with previously deployed application(s) with similar platform and middleware requirements are presented to a user. The user can select an architecture for deploying the application. The application is continuously monitored after deployment, and alternative architectures to improve the application can be presented to the user, if desired.
    Type: Grant
    Filed: May 25, 2016
    Date of Patent: October 3, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9781220
    Abstract: An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration.
    Type: Grant
    Filed: May 25, 2016
    Date of Patent: October 3, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9756060
    Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.
    Type: Grant
    Filed: November 15, 2016
    Date of Patent: September 5, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9747891
    Abstract: A method for recommending the pronunciation of a name includes providing a plurality of audio records wherein the audio records include a set of audio records identifying the pronunciation of a common name. The method also includes analyzing the set of audio records identifying the pronunciation to determine the most frequent common pronunciation of the common name in the set of audio records. Once determined, the most frequent common pronunciation of the common name is presented to an end user.
    Type: Grant
    Filed: May 18, 2016
    Date of Patent: August 29, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20170222888
    Abstract: An approach for assessing a service offering selected by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, a network environment containing the service offering is monitored for a software configuration activity performed by the user. This software configuration activity is analyzed to identify the software application that is being configured. A set of provider-managed service offerings can be searched for any provider-managed service offering that contains an offered application corresponding to that of the software application. This managed service offering can be included in an alternative suggestion for the service offering.
    Type: Application
    Filed: April 13, 2017
    Publication date: August 3, 2017
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook