Patents by Inventor Susheel Gooly

Susheel Gooly has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240061674
    Abstract: Application transition and transformation is provided by observing and analyzing execution of a monolithic application to provide properties of the data communication of the monolithic application, identifying, by an artificial intelligence engine, atomic application element(s) having logical functional block(s) that function independent of other atomic application element, determining, by the artificial intelligence engine, candidate atomic application element(s) for migrating out of the monolithic application and refactoring, based on automated testing and validation, refactoring at least one candidate atomic application element into a respective at least one refactored element, where the refactoring selects a platform technology for the refactored element and implements functionality of the candidate atomic application element as the refactored element of the selected platform technology, and providing the at least one refactored element to system(s) for execution thereon.
    Type: Application
    Filed: August 22, 2022
    Publication date: February 22, 2024
    Inventors: Clea ZOLOTOW, Susheel GOOLY, Rudolph C. BARON, JR., Kim Poh WONG, Marci D. FORMATO, Tedrick N. Northway
  • Patent number: 11546354
    Abstract: A method includes: determining, by a computer device, affinities between components in a networked computer system; determining, by the computer device, a risk level of each of the components; determining, by the computer device, a risk level of the networked computer system; detecting, by the computer device, a threat in the networked computer system; determining, by the computer device, an action based on the threat, the risk level of ones of the components affected by the threat, and the risk level of the system; and reconfiguring, by the computer device, the networked computer system based on the determined action.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: January 3, 2023
    Assignee: KYNDRYL, INC.
    Inventors: Jack Louis Cherkas, Clea Zolotow, Kim Poh Wong, Susheel Gooly, Jørgen Egbert Floes, Jeanette Louise Livings, Tedrick N. Northway
  • Patent number: 11449478
    Abstract: Computer-implemented methods, systems and computer program products leveraging blockchain networks to securely store a tamper-proof ledger comprising an audit trail describing the completion or missed data migration tasks, based on a timeline of an end-to-end data migration task schedule. Each of the event logs and alerts from the data migration source, data migration target, and/or migration tools, including network device logs, operating system logs, user-access logs, alerts, migration tool output etc. associated with the end-to-end migration tasks is made a part of the audit trail and stored to the ledger of the blockchain. All event logs, alert or other digital assets recorded to blocks of the blockchain can be timestamped, hashed and distributed across all nodes of the blockchain network and verified as valid by each of the peer nodes. As blocks updating the audit trail are added to the blockchain, the entries cannot be modified or tampered with.
    Type: Grant
    Filed: October 8, 2020
    Date of Patent: September 20, 2022
    Assignee: KYNDRYL, INC.
    Inventors: Kumar Saurabh, Gururajan Sundaramurthy, Susheel Gooly
  • Publication number: 20220114150
    Abstract: Computer-implemented methods, systems and computer program products leveraging blockchain networks to securely store a tamper-proof ledger comprising an audit trail describing the completion or missed data migration tasks, based on a timeline of an end-to-end data migration task schedule. Each of the event logs and alerts from the data migration source, data migration target, and/or migration tools, including network device logs, operating system logs, user-access logs, alerts, migration tool output etc. associated with the end-to-end migration tasks is made a part of the audit trail and stored to the ledger of the blockchain. All event logs, alert or other digital assets recorded to blocks of the blockchain can be timestamped, hashed and distributed across all nodes of the blockchain network and verified as valid by each of the peer nodes. As blocks updating the audit trail are added to the blockchain, the entries cannot be modified or tampered with.
    Type: Application
    Filed: October 8, 2020
    Publication date: April 14, 2022
    Inventors: Kumar Saurabh, Gururajan Sundaramurthy, Susheel Gooly
  • Publication number: 20210160255
    Abstract: A method includes: determining, by a computer device, affinities between components in a networked computer system; determining, by the computer device, a risk level of each of the components; determining, by the computer device, a risk level of the networked computer system; detecting, by the computer device, a threat in the networked computer system; determining, by the computer device, an action based on the threat, the risk level of ones of the components affected by the threat, and the risk level of the system; and reconfiguring, by the computer device, the networked computer system based on the determined action.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Jack Louis CHERKAS, Clea ZOLOTOW, Kim Poh WONG, Susheel GOOLY, Jørgen Egbert FLOES, Jeanette Louise LIVINGS, Tedrick N. NORTHWAY
  • Patent number: 10884646
    Abstract: A method, apparatus, system, and computer program product for managing a storage system. Data associated with a set of tags is identified by a computer system using a policy, wherein the policy defines the set of tags for a set of types of data used in a process performed in an organization using data in the storage system. A set of storage tiers for the data associated with the set of tags is determined by the computer system using the policy. The policy defines the set of storage tiers for the data associated with the set of tags when the data associated with the set of tags is used by the process. The data associated with the set of tags is moved by the computer system to the set of storage tiers as determined using the policy.
    Type: Grant
    Filed: November 6, 2018
    Date of Patent: January 5, 2021
    Assignee: International Business Machines Corporation
    Inventors: Gavin C. O'Reilly, Susheel Gooly, Clea A. Zolotow, Tedrick N. Northway, Derek Lacey
  • Publication number: 20200351381
    Abstract: At least one shared brokerage service can be hosted on shared hardware. At least a first private brokerage service hosted on first private hardware can be identified. At least a second private brokerage service hosted on second private hardware can be identified. For a first customer, a cloud service broker orchestrates communication of data between the shared brokerage service and the first private brokerage service using application programming interface (API) calls to a first API executing on first private hardware. For a second customer, the cloud service broker orchestrates communication of data between the shared brokerage service and the second private brokerage service using API calls to a second API executing on second private hardware.
    Type: Application
    Filed: May 1, 2019
    Publication date: November 5, 2020
    Inventors: Derek Lacey, Clea Anne Zolotow, Petra Kopp, Thomas Brackhahn, Susheel Gooly, Pedro Soares, Tedrick N. Northway
  • Publication number: 20200142625
    Abstract: A method, apparatus, system, and computer program product for managing a storage system. Data associated with a set of tags is identified by a computer system using a policy, wherein the policy defines the set of tags for a set of types of data used in a process performed in an organization using data in the storage system. A set of storage tiers for the data associated with the set of tags is determined by the computer system using the policy. The policy defines the set of storage tiers for the data associated with the set of tags when the data associated with the set of tags is used by the process. The data associated with the set of tags is moved by the computer system to the set of storage tiers as determined using the policy.
    Type: Application
    Filed: November 6, 2018
    Publication date: May 7, 2020
    Inventors: Gavin C. O'Reilly, Susheel Gooly, Clea A. Zolotow, Tedrick N. Northway, Derek Lacey