Patents by Inventor Tau Cham

Tau Cham has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060106590
    Abstract: A computing services discovery system and a method therefor for detecting and discovering properties of deployed computing services in an existing computing system are disclosed. A computing system deployment model introduces layers and clusters for segregating computing system, system and resource components based on their functionality and services provided thereby. Associations between components are registered in profiles to facilitate dependency tracking. The computing system deployment model allows for structured deployment of the computing system onto a host system. However, in an existing computing system, the deployment plan of the deployed computing services is not known. An embodiment of the invention based on the computing system deployment model allows the deployed computing services to be detected and properties describing the components of the services to be extracted.
    Type: Application
    Filed: May 16, 2003
    Publication date: May 18, 2006
    Applicant: Agency for Science, Technology and Research
    Inventors: Hui Tseng, Emarson Victoria, Tau Cham
  • Publication number: 20060005162
    Abstract: Management of the enterprise applications to maintain architectural integrity and performance of the entreprise applications is critical for providing avaliability of business services to users. When components of an application or computing system are moved between two systems, there is a need to reconfigure a previously configure system. Thus, the deployment requires complicated procedures that requires specialized training in the application being installed to ensure that system integrity is preserved at all times. A computing system deploymemt model introduces layers and clusters for segregating computing system, system and resources components based on their functionality and services provided thereby. Associations between components are registred in profiles to facilitate dependency tracking. The computer system deployment model allows for structured deployment of the computing system onto a host system.
    Type: Application
    Filed: June 3, 2002
    Publication date: January 5, 2006
    Applicant: Agency for Science, Technology And Research
    Inventors: Hui Tseng, Emarson Victoria, Hwee Pang, Tau Cham
  • Publication number: 20050235248
    Abstract: An apparatus for discovering computing services architecture and developing patterns of computing services and method therefor are disclosed. The apparatus, according to an embodiment of the invention, provides a graphical user interface for displaying a deployment plan of deployed computing services. Components in the deployment plan are interconnected by links indicating dependency relationships between the components. Each component and link is assigned a confidence value, which is based on a calculated weight of the properties of each component. The apparatus further provides editing tools for manipulating the components in the deployment plan as well as for creating and managing patterns.
    Type: Application
    Filed: May 16, 2003
    Publication date: October 20, 2005
    Applicant: Agency for Science, Technology and Research
    Inventors: Emarson Victoria, Hui Ming Jason, Hwee Pang, Tau Cham, Siew Tay
  • Publication number: 20050177628
    Abstract: Conventional computing systems today, for example enterprise applications, possess multi-tier architectures. Management of the computing systems to maintain architectural system onto which the computing systems are deployed onto, is critical for providing availability of business services to users. When components of a computing system or computing system are moved between two host systems, there is a need to reconfigure a previously configured host system. Thus, the deployment requires complicated procedures that requires specialized training in the computing system being installed as system integrity has to be preserved at all times. Furthermore, a computing system will undergo further component replacements, enhancements and expansion in scale once it becomes operational within the system. Keeping the dependencies and the integrity of a large scale host system becomes problematic as different components of the computing systems are provided by different vendors.
    Type: Application
    Filed: May 16, 2002
    Publication date: August 11, 2005
    Inventors: Emarson Victoria, Hui Tseng, Hwee Pang, Tau Cham