Patents by Inventor Soobaek Jang

Soobaek Jang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8966085
    Abstract: Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified. It will then be determined whether the set of computing resources are sufficient to process the workload request. If the set of computing resources are under-allocated (or are over-allocated), a resource scaling policy may be accessed. The set of computing resources may then be scaled based on the resource scaling policy, so that the workload request can be efficiently processed while maintaining compliance with the resource scaling policy.
    Type: Grant
    Filed: January 4, 2012
    Date of Patent: February 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 8949415
    Abstract: An approach for activity-based virtual machine (VM) availability in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a system provided under the present approach monitors and logs network traffic and performs network packet inspections. Based on the contents of the network packets, the system may determine which applications/processes on particular VMs that are associated with the traffic. Users of this system may configure rules and thresholds. Regardless, if an availability threshold is not met as compared to a volume of network traffic, certain network traffic disablement actions can be taken. Users may also configure those conditions that will result in re-enablement of the network and/or processes that were disabled.
    Type: Grant
    Filed: January 4, 2012
    Date of Patent: February 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20150019271
    Abstract: A computer collects resource reservation history for a resource for a plurality of reservation time blocks. The computer collects resource reservation wait time history for the resource for each reservation time block. The computer determines a number of patrons that utilized the resource during each reservation time block and creates a resource reservation wait time model. The computer receives a request for a resource reservation wait time estimate for a first reservation time block and collects a first plurality of social media content. The computer determines an estimated number of patrons that intend to utilize the resource during the first reservation time block based on at least the first plurality of social media content. The computer determines a first estimated wait time for the first reservation time block by comparing at least the estimated number of patrons to the resource reservation wait time model.
    Type: Application
    Filed: July 11, 2013
    Publication date: January 15, 2015
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20150012630
    Abstract: Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, computer code and data of an application is annotated with metadata defining a set of runtime policies for executing the computer code and data. Once a request is received to run the application, a set of parameters (e.g., geographic location) corresponding to the execution of the computer code and data of the application is dynamically determined, and compared to the runtime policies. The runtime policies for executing the computer code and data are then enforced at runtime. This includes either running the application, or preventing the running of the application in the case that the set of parameters corresponding to the execution of the computer code and data of the application do not satisfy the runtime policies.
    Type: Application
    Filed: July 3, 2013
    Publication date: January 8, 2015
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 8918470
    Abstract: In a method for notifying a participant of an online conference of when a portion of content will be presented during the online conference, a computer receives at least one data item identifying the portion of content. The computer determines an estimate of a time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. The computer transmits a user notification including the estimate of the time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate.
    Type: Grant
    Filed: March 6, 2012
    Date of Patent: December 23, 2014
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Kulvir Singh Bhogal, Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 8918448
    Abstract: A computer implemented method, a data processing system, and a computer program product deploy application components within a distributed environment. A Runtime management platform opens an application archive for an application to be deployed onto a distributed computing environment. The runtime management platform identifies a set of application components for the application. The runtime management platform identifies at least one set of rules defining application component deployment patterns for the set of application components. The runtime management platform deploys the set of application components to a set of runtime containers according to the at least one set of rules defining the application component deployment patterns.
    Type: Grant
    Filed: May 11, 2012
    Date of Patent: December 23, 2014
    Assignee: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Brian D. Goodman, Soobaek Jang
  • Publication number: 20140359110
    Abstract: An approach for authorizing an action requested by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a request for a particular action associated with a computing resource is received. The connected systems which may be affected by the requested action are identified. The actual users of the connected systems are determined. A response from each of the actual users is requested. The responses are collected and weighted to determine if authorization for the requested action is granted.
    Type: Application
    Filed: June 4, 2013
    Publication date: December 4, 2014
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20140330975
    Abstract: Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and be provided with a set of suggested commands that are typically utilized for similar and/or previous instances of the virtual resource.
    Type: Application
    Filed: May 2, 2013
    Publication date: November 6, 2014
    Applicant: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Gregory J. Boss, Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20140330782
    Abstract: An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties.
    Type: Application
    Filed: May 2, 2013
    Publication date: November 6, 2014
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 8881136
    Abstract: Embodiments of the present invention provide an approach to mitigate the risk of downtime or failed upgrades to a networked computing environment (e.g., a cloud computing infrastructure). This approach generally comprises pre-testing and evaluating potential upgrade paths to identify potential problems, and optionally recommending one or more optimal configurations. Specifically, if a proposed upgrade is identified as having potential points of failure (e.g., based on pre-testing), an end user/customer may be so notified. If the upgrade has several potential successful configurations, such configurations may be evaluated to identify a configuration that appears to have the greatest likelihood of a successful installation scenario. Optionally, the end user may then choose to redirect workload(s) to a successfully configured system that has been provisioned and pre-tested.
    Type: Grant
    Filed: March 13, 2012
    Date of Patent: November 4, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 8880841
    Abstract: Embodiments of the present invention provide an approach to forecast a potential demand for partitioned/sharded data and to distribute the data among a set of data partitions based on forecasted demand to optimize network characteristics (e.g., network bandwidth) and/or expedite data retrieval. For example, the data may be distributed among the partitions based on a quantity of trends/requests/hits on the data, so that requests for the data can be balanced among the partitions geographically.
    Type: Grant
    Filed: November 15, 2011
    Date of Patent: November 4, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20140325077
    Abstract: Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and make a determination as to what commands are typically utilized for similar and/or previous instances of the virtual resource.
    Type: Application
    Filed: July 14, 2014
    Publication date: October 30, 2014
    Inventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat Deluca, Soobaek Jang
  • Publication number: 20140317263
    Abstract: An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration.
    Type: Application
    Filed: April 17, 2013
    Publication date: October 23, 2014
    Applicant: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 8856664
    Abstract: A method for prompting expertise in a collaboration environment includes drafting a message for a collaboration environment in a graphical user interface; entering a name of at least one recipient for the message; obtaining expertise information about the at least one recipient; and highlighting at least one word of the message that is associated with the obtained expertise information in the graphical user interface.
    Type: Grant
    Filed: May 24, 2012
    Date of Patent: October 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20140297760
    Abstract: In a method for managing e-mail messages between related e-mail accounts, an e-mail message is received from a first e-mail account of a user. It is determined that the e-mail message should be listed as a sent e-mail message in a second e-mail account of the user. The e-mail message is listed as a sent e-mail message in the second e-mail account.
    Type: Application
    Filed: March 28, 2013
    Publication date: October 2, 2014
    Applicant: International Business Machines Corporation
    Inventors: Soobaek Jang, Raghava Reddy Kapu Veera, Rehan Altaf, JooYoun Shin
  • Patent number: 8843621
    Abstract: Embodiments of the present invention relate to an approach for using electronic feeds (e.g., online news feeds, social media resources/websites, etc.) to predict potentially harmful events and take preemptive measures/actions to minimize and/or avoid loss. In a typical embodiment, a set of electronic feeds (e.g., news feeds and/or social networking website feeds) is accessed. A query is then issued against the set of feeds based on a set of search criteria pertaining to a possible event having a potential to adversely affect the networked computing environment. A set of results is received in a computer memory medium of the networked computing environment. It may then be determined whether at least one property of the set of results (e.g., a quantity of ‘hits’) meets one or more predetermined event criteria (e.g., a predetermined threshold).
    Type: Grant
    Filed: October 25, 2011
    Date of Patent: September 23, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 8838700
    Abstract: A method, system, and computer program product for implementing message mapping of communications is provided. The method includes receiving a communication and a time-stamp of the communication from a messaging system of an originating terminal device and receiving a request to respond to the communication from a messaging system at a recipient terminal device. The request includes a first response and a first selected portion of the communication to which the first response is directed. The method also includes generating an index that defines parameters of the first selected portion in context with the communication and generating a responsive communication that includes the first response and the index. The index is operable for communicating the parameters of the first selected portion to the originating terminal device. The method further includes mapping the responsive communication to the communication via the time-stamp.
    Type: Grant
    Filed: May 15, 2008
    Date of Patent: September 16, 2014
    Assignee: International Business Machines Corporation
    Inventor: Soobaek Jang
  • Patent number: 8838799
    Abstract: Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and make a determination as to what commands are typically utilized for similar and/or previous instances of the virtual resource.
    Type: Grant
    Filed: February 13, 2012
    Date of Patent: September 16, 2014
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 8825778
    Abstract: A method for allowing selective display of past instant messages includes establishing an instant messaging session among at least two participants. Each participant has an associated computer system, with all of the associated computing systems in communication across a network. A list of instant messages between the at least two participants is displayed on monitors associated with the computing systems. At least one instant message is selected from the list of instant messages using an access control. At least one new participant is invited to join the instant messaging session. When the selected at least one instant message corresponds to the at least one new participant, the selected at least one instant message is displayed on a monitor used by the at least one new participant.
    Type: Grant
    Filed: January 18, 2012
    Date of Patent: September 2, 2014
    Assignee: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Albert DeLucca, Soobaek Jang
  • Publication number: 20140245394
    Abstract: A trust-based approach for authorizing computing resources in a networked computing environment is provided. Specifically, in a typical embodiment, a candidate computing resource (e.g., a virtual machine) will submit a request to join a network computing environment (“environment”). Based on the request, a message will be communicated to previously authorized/joined computing resources to poll/solicit their votes as to whether the candidate computing resource should be trusted/authorized in the environment. Based on the responses submitted by the polled computing resources, the candidate computing resource may be authorized or denied membership in the environment. If authorized, a permission level may be set (e.g., as recommended by the polled computing resources).
    Type: Application
    Filed: February 26, 2013
    Publication date: August 28, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook