Patents by Inventor Soobaek Jang

Soobaek Jang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140229591
    Abstract: In general, embodiments of the invention provide an approach to differentiate and/or customize image files in a networked (e.g., cloud) computing environment. Specifically, a plurality of images corresponding to a requested instance, and all configuration files corresponding to the plurality of images, will be identified. In identifying the configuration files, a first subset of configuration files that are common to all of the plurality of images, and a second subset of configuration files that are unique to individual images will be determined. The user can then individually select configuration files from the two subsets, and the requested instance can be generated based thereon.
    Type: Application
    Filed: April 23, 2014
    Publication date: August 14, 2014
    Applicant: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20140229218
    Abstract: A method, computer program product, and system for providing notifications regarding electronic meetings is described. A set of one or more invitees for an online meeting is received, the set including a first invitee. A first status of the first invitee is identified, the first status indicating unavailability with respect to the electronic meeting. A change in status of the first invitee, after the end of the electronic meeting, to a second status indicating availability with respect to the electronic meeting is identified. A notification of the meeting is provided to the first invitee, based upon, at least in part, identifying the change in status.
    Type: Application
    Filed: February 12, 2013
    Publication date: August 14, 2014
    Applicant: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20140229555
    Abstract: A productivity system, method and a computer program product therefor. A communications client, e.g., email, for an address identified with a user receives communications. Events for the identified user are listed, e.g., scheduled on a calendar. An event-driven communications manager interactively coordinates communications delivery to the address responsive to scheduled events. In particular, communications, such as emails, may be selectively delayed during one or more said scheduled events, e.g., virtual meetings.
    Type: Application
    Filed: February 13, 2013
    Publication date: August 14, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lisa Seacat DeLuca, Soobaek Jang, Michael Muller
  • Publication number: 20140215436
    Abstract: An approach that analyzes and manages unresolved (i.e., pending, outgoing) change-sets is provided. Specifically, this approach parses the change-set into a plurality (i.e., one or more) of changes to determine the impact each change may have. An alert may be provided to the user indicating whether the change-set should be checked-in based on the determined impact. Specifically, a change-set management tool provides this capability. The change-set management tool includes a parsing module configured to receive an outgoing change-set; and parse the change-set into a plurality of changes. The change-set management tool further comprises an evaluation module configured to evaluate an impact that each of the plurality of changes within the change-set has on other changes of the plurality of changes within the change-set.
    Type: Application
    Filed: March 28, 2014
    Publication date: July 31, 2014
    Applicant: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Soobaek Jang, Troy M. Volin
  • Publication number: 20140208444
    Abstract: Systems and methods for temporary obfuscation during collaborative communications are provided. A method for obfuscation during collaborative communications, comprises entering a message including content into a first messaging device, marking the content as sensitive, sending the message including the content via a network to a second messaging device, and obfuscating the marked content and displaying any remaining portions of the message on the second messaging device.
    Type: Application
    Filed: January 23, 2013
    Publication date: July 24, 2014
    Applicant: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20140208445
    Abstract: Systems and methods for temporary obfuscation during collaborative communications are provided. A method for obfuscation during collaborative communications, comprises entering a message including content into a first messaging device, marking the content as sensitive, sending the message including the content via a network to a second messaging device, and obfuscating the marked content and displaying any remaining portions of the message on the second messaging device.
    Type: Application
    Filed: September 5, 2013
    Publication date: July 24, 2014
    Applicant: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 8788485
    Abstract: A method and system for remote binding of meta-content to a uniform resource indicator are provided. The method includes providing a script to a web browser application in response to the web browser, application accessing the uniform resource identifier of a content provider system and requesting an asset therefrom. The script is generated by a remote server system and is provided to the web browser application by routing the web browser application from the content provider system to the remote server system. The method also includes receiving a call from the web browser application at the remote server system via the script. The call includes the uniform resource identifier of the content provider system. Using the uniform resource identifier, the remote server system queries a data source to determine whether meta-content for the asset is available.
    Type: Grant
    Filed: May 11, 2007
    Date of Patent: July 22, 2014
    Assignee: International Business Machines Corporation
    Inventors: Soobaek Jang, Dimitri Kanevsky, Michael W. Lipton, Joshua M. Woods, Alexander Zlatsin
  • Patent number: 8775575
    Abstract: In general, embodiments of the invention provide an approach to differentiate and/or customize image files in a networked (e.g., cloud) computing environment. Specifically, a plurality of images corresponding to a requested instance, and all configuration files corresponding to the plurality of images, will be identified. In identifying the configuration files, a first subset of configuration files that are common to all of the plurality of images, and a second subset of configuration files that are unique to individual images will be determined. The user can then individually select configuration files from the two subsets, and the requested instance can be generated based thereon.
    Type: Grant
    Filed: November 3, 2010
    Date of Patent: July 8, 2014
    Assignee: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 8776048
    Abstract: Illustrative embodiments include a method, system, and computer program product for early configuration of an application in a deployment of an enterprise application. A section is located in an enterprise application deployment file of the enterprise application. The section includes configuration information of the application. The configuration information of the application is loaded before completing loading of the enterprise application deployment file such that the application is configurable without waiting for the loading of the enterprise application deployment file to complete. Loading the enterprise application deployment file is continued without waiting for a configuring of the application using the configuration information of the application that is loaded.
    Type: Grant
    Filed: May 22, 2012
    Date of Patent: July 8, 2014
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Kulvir Singh Bhogal, Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20140189865
    Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.
    Type: Application
    Filed: January 2, 2013
    Publication date: July 3, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Publication number: 20140164510
    Abstract: Rescheduling unfinished meeting agenda topics includes detecting an unfinished meeting agenda topic at a conclusion of a meeting and rescheduling with a meeting management engine the unfinished meeting agenda topic to be addressed in a later meeting.
    Type: Application
    Filed: December 11, 2012
    Publication date: June 12, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20140164446
    Abstract: Embodiments of the present invention provide an approach for sharing electronic file metadata in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, metadata related to electronic files stored in a shared storage device is maintained and updated. Such metadata may be viewable via a user interface of one or more applications used to access the files (e.g., from a plurality of computerized/electronic devices). Among other things, the metadata may identify previous accesses of the files (e.g., by user, date/time, etc.), and may be provided in a list or the like.
    Type: Application
    Filed: December 6, 2012
    Publication date: June 12, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 8707302
    Abstract: A technique for personalizing feed content in virtualized computing environments includes accessing, using a data processing system, metadata associated with a virtual machine instance that is stored in a database. The technique also includes prioritizing, using the data processing system, feed content delivered to a client associated with the virtual machine instance based on the metadata.
    Type: Grant
    Filed: January 6, 2011
    Date of Patent: April 22, 2014
    Assignee: International Business Machines Corporation
    Inventors: Lisa S. DeLuca, Brian D. Goodman, Soobaek Jang
  • Publication number: 20140081693
    Abstract: Disclosed herein are a computer-implemented method, computer program and system to invite one or more people to a meeting. The method includes, in response to a user identifying one or more documents related to a meeting, analyzing the one or more documents to identify a name or names of people associated with the one or more documents; attempting to locate at least some of the identified people, such as in one or both of a database and a social network space, in order to obtain additional information regarding the at least some of the identified people; and presenting the user with a list of located identified people, the list being a list of people who are suggested to the user to be invited to the meeting.
    Type: Application
    Filed: September 18, 2012
    Publication date: March 20, 2014
    Applicant: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20140082000
    Abstract: Disclosed herein in part is a data processing system configured to invite one or more people to a meeting. The data processing system includes at least one data processor connected with at least one memory storing computer program code. Execution of the computer program code by the at least one data processor results in operations being performed that include, in response to a user identifying one or more documents related to a meeting, analyzing the one or more documents to identify a name or names of people associated with the one or more documents; attempting to locate at least some of the identified people in order to obtain additional information regarding the at least some of the identified people; and presenting the user with a list comprising identified people, the list being a list of people who are suggested to the user to be invited to the meeting.
    Type: Application
    Filed: September 20, 2012
    Publication date: March 20, 2014
    Applicant: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Kulvir S. Bhogal, Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20140068075
    Abstract: An approach is provided for optimizing service factors for computing resources in a networked computing environment. Specifically, under one approach, a cloud broker/aggregator, a cloud offering optimizer, and a user workload optimizer may be provided. The cloud aggregator may aggregate information/data pertaining to a set of service factors associated with a set of resources distributed among a set of deployment groups (e.g., cloud pods). The cloud offering optimizer may analyze this information and may determine a reallocation plan to optimize values of the service factors associated with the set of resources. The user workload optimizer may then receive the reallocation plan from the cloud offering optimizer and/or application event information, and modify the deployment topology accordingly.
    Type: Application
    Filed: August 28, 2012
    Publication date: March 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Milton A. Bonilla, Soobaek Jang, Thanh T. Pham, Dmitry Rekesh, Peter P. Rodriguez, Kathleen H. Sittler, Brian J. Snitzer
  • Publication number: 20140026116
    Abstract: An embodiment of the invention provides a method for source control in a computer program, wherein the computer program includes a plurality of files for execution of a plurality of processes. A revised process that is selected by a user on a graphical user interface is identified, wherein the revised process includes an execution path. A revised portion of a file in the revised process that the user is revising, has revised, and/or is planning on revising is identified. Portions of files that are in the execution path of the revised process are identified. The portions of the files in the execution path of the revised process are locked with a source control processor. The locking disallows revisions (e.g., write and delete operations) to the portions of the files in the execution path of the revised process that are not made by the user.
    Type: Application
    Filed: July 18, 2012
    Publication date: January 23, 2014
    Applicant: International Business Machines Corporation
    Inventors: Albert A. DeLucca, Lisa Seacat DeLuca, Soobaek Jang, Troy Machael Volin
  • Publication number: 20140026119
    Abstract: Embodiments of the present invention relate to an integrated development environment (IDE)-based approach for testing development projects (e.g., comprising one or more intended workloads). In a typical embodiment, a designation of a project (e.g. having a set of workloads) for testing on a network resource group is received via a user interface associated with an IDE. A current server instance in the network resource group having a highest availability for testing the project may then be identified (e.g., based on an analysis of various computing/cost characteristics). The project may then be deployed to the current server instance, and a network address corresponding to the current server instance may be associated with the project in a computer storage device. The project may then be tested by processing the set of intended workloads using the current server instance.
    Type: Application
    Filed: July 18, 2012
    Publication date: January 23, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang
  • Publication number: 20140025653
    Abstract: An embodiment of the invention provides a method for source control in a program, wherein the program includes hierarchical files for execution of processes, wherein the hierarchical files include parent files and child files. A revised process selected by a user on a graphical user interface is identified; and, files in the revised process are identified. The files in the revised process are locked with a source control processor. This includes disallowing revisions to the files in the revised process. One or more files that are descendents of a file in the revised process are identified. The one or more files that are descendents of a file in the revised process are locked with the source control processor. This includes disallowing revisions to the one or more files that are descendents of a file in the revised process.
    Type: Application
    Filed: September 6, 2012
    Publication date: January 23, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Albert A. DeLucca, Lisa Seacat DeLuca, Soobaek Jang, Troy Michael Volin
  • Publication number: 20140026117
    Abstract: An embodiment of the invention provides a method for source control in a computer program, wherein the computer program includes a plurality of files for execution of a plurality of processes. A revised process that is selected by a user on a graphical user interface is identified, wherein the revised process includes an execution path. A revised portion of a file in the revised process that the user is revising, has revised, and/or is planning on revising is identified. Portions of files that are in the execution path of the revised process are identified. The portions of the files in the execution path of the revised process are locked with a source control processor. The locking disallows revisions (e.g., write and delete operations) to the portions of the files in the execution path of the revised process that are not made by the user.
    Type: Application
    Filed: September 6, 2012
    Publication date: January 23, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Albert A. DeLucca, Lisa Seacat DeLuca, Soobaek Jang, Troy Michael Volin