Patents by Inventor Tomasz Hanusiak
Tomasz Hanusiak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12001864Abstract: Containerized software discover and identification can include discovering a plurality of container remnants by electronically scanning portions of computer memory of at least one computer system of one or more of computing nodes, the portions of computer memory being allocated to persistent storage of computer data, and each container remnant containing computer data providing a record of system-generated execution attributes generated in response to execution of one or more containerized applications. One or more inactive container remnants unutilized by a currently running containerized application can be identified among the plurality of container remnants. Each inactive container remnant can be categorized, the categorizing being based on system-generated execution attributes contained in each inactive container remnant.Type: GrantFiled: December 24, 2020Date of Patent: June 4, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Piotr P. Godowski, Michal Paluch, Tomasz Hanusiak, Szymon Kowalczyk, Andrzej Pietrzak
-
Patent number: 12001863Abstract: Containerized software discover and identification can include discovering a plurality of container remnants by electronically scanning portions of computer memory of at least one computer system of one or more of computing nodes, the portions of computer memory being allocated to persistent storage of computer data, and each container remnant containing computer data providing a record of system-generated execution attributes generated in response to execution of one or more containerized applications. One or more inactive container remnants unutilized by a currently running containerized application can be identified among the plurality of container remnants. Each inactive container remnant can be categorized, the categorizing being based on system-generated execution attributes contained in each inactive container remnant.Type: GrantFiled: September 21, 2020Date of Patent: June 4, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Piotr P. Godowski, Michal Paluch, Tomasz Hanusiak, Szymon Kowalczyk, Andrzej Pietrzak
-
Patent number: 11847483Abstract: One or more computer processors responsive to a hypervisor data request, generate an encrypted set of hypervisor data indicating hypervisor hardware details using a plurality of respective asymmetric encryption keys to tag the generated set of encrypted hypervisor data with a timestamp at a time of encryption. The one or more computer processors decrypt the tagged set of encrypted hypervisor data utilizing a software asset manager and the plurality of respective asymmetric encryption keys determined valid based on a threshold time period and the tagged timestamp. The one or more computer processors validate the set of decrypted hypervisor data utilizing corresponding checksums to determine whether the set of encrypted hypervisor data was successfully decrypted. The one or more computer processors sanitize the validated hypervisor data based on a corresponding software license.Type: GrantFiled: December 3, 2020Date of Patent: December 19, 2023Assignee: International Business Machines CorporationInventors: Szymon Kowalczyk, Andrzej Pietrzak, Michal Paluch, Tomasz Hanusiak, Piotr P. Godowski
-
Patent number: 11762707Abstract: A computer implemented method and related system determine a current load result of a software container executing on a compute node in a container system. In response to determining that the current load result exceeds a predetermined scale-up threshold for the software container, the method adds a first plurality of replicas of the software container to the compute node, where a quantity of the first plurality of replicas is related to the current load result. In response to determining that the current load result is less than a predetermined scale-down threshold for the software container, the method deletes a second plurality of replicas of the software container from the compute node, where a quantity of the second plurality of replicas is related to the current load result.Type: GrantFiled: March 30, 2021Date of Patent: September 19, 2023Assignee: International Business Machines CorporationInventors: Szymon Kowalczyk, Piotr P. Godowski, Michal Paluch, Tomasz Hanusiak, Andrzej Pietrzak
-
Patent number: 11687434Abstract: Provided are a computer program product, system, and method for scanning a computing system to determine a computing system profile and problems to recommend actions to initiate with the computing system. A package is transmitted to the computing system including package code to scan the computing system to determine a computing system profile comprising a computing architecture and installed applications at the computing system. The computing system profile is processed to determine a recommended action to perform with respect to the computing system to improve operations of the computing system based on the computing system profile. A display element is generated in a user interface with information on the recommended action to enable a user of the computing system to implement the recommended action. The package code executes within the computing system without communicating over the network to an external system outside of a computing environment of the computing system.Type: GrantFiled: October 27, 2021Date of Patent: June 27, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Andrzej Pietrzak, David Warren Knapp, Jr., Michal Paluch, Tomasz Hanusiak, Piotr P. Godowski, Szymon Kowalczyk
-
Publication number: 20230129856Abstract: Provided are a computer program product, system, and method for scanning a computing system to determine a computing system profile and problems to recommend actions to initiate with the computing system. A package is transmitted to the computing system including package code to scan the computing system to determine a computing system profile comprising a computing architecture and installed applications at the computing system. The computing system profile is processed to determine a recommended action to perform with respect to the computing system to improve operations of the computing system based on the computing system profile. A display element is generated in a user interface with information on the recommended action to enable a user of the computing system to implement the recommended action. The package code executes within the computing system without communicating over the network to an external system outside of a computing environment of the computing system.Type: ApplicationFiled: October 27, 2021Publication date: April 27, 2023Inventors: Andrzej Pietrzak, David Warren Knapp, JR., Michal Paluch, Tomasz Hanusiak, Piotr P. Godowski, Szymon Kowalczyk
-
Patent number: 11567924Abstract: Technology for logging application usage based on monitoring of read or change operations on database elements and then using the information from log data to determine application usage states (for example, active, inactive) in time.Type: GrantFiled: March 26, 2020Date of Patent: January 31, 2023Assignee: International Business Machines CorporationInventors: Michal Paluch, Tomasz Hanusiak, Andrzej Pietrzak, Michal Maciej Zalas
-
Patent number: 11556655Abstract: An image for a containerized application is created. From the image, one or more main processes of the containerized application are identified. The one or more main processes comprise a first subset of a plurality of processes of the containerized application. Within a sandbox environment, the containerized application is started. Based on the started application within the sandbox environment, a second subset of processes within the plurality is determined. The second subset includes one or more dependent processes associated with the first subset. A third subset of processes within the plurality is determined. The third subset excludes the first and second subsets and is associated with a vulnerability list. According to the third subset, a mitigated image for the containerized application is generated.Type: GrantFiled: January 26, 2021Date of Patent: January 17, 2023Assignee: International Business Machines CorporationInventors: Piotr P. Godowski, Szymon Kowalczyk, Michal Paluch, Tomasz Hanusiak, Andrzej Pietrzak
-
Patent number: 11481502Abstract: A first computer system is scanned at configured, default time intervals by a software asset management (“SAM”) software application installed on the first computer system, wherein the scanning detects other software applications installed on the first computer system. The SAM software application generates a list of the other software applications installed on the first computer system and stores the list on a computer readable storage medium. An override software module triggers the SAM software application to perform an early scan of the first computer system, before a scan of the first computer system that the SAM software application would otherwise perform at a next default scan time. The triggering is in response to information obtained from a source external to the first computer system about a triggering one of the software applications on the list.Type: GrantFiled: February 14, 2020Date of Patent: October 25, 2022Assignee: International Business Machines CorporationInventors: Michal Paluch, Piotr P. Godowski, Andrzej Pietrzak, Szymon Kowalczyk, Tomasz Hanusiak
-
Publication number: 20220318058Abstract: A computer implemented method and related system determine a current load result of a software container executing on a compute node in a container system. In response to determining that the current load result exceeds a predetermined scale-up threshold for the software container, the method adds a first plurality of replicas of the software container to the compute node, where a quantity of the first plurality of replicas is related to the current load result. In response to determining that the current load result is less than a predetermined scale-down threshold for the software container, the method deletes a second plurality of replicas of the software container from the compute node, where a quantity of the second plurality of replicas is related to the current load result.Type: ApplicationFiled: March 30, 2021Publication date: October 6, 2022Inventors: Szymon Kowalczyk, PIOTR P. GODOWSKI, Michal Paluch, Tomasz Hanusiak, Andrzej Pietrzak
-
Publication number: 20220237301Abstract: An image for a containerized application is created. From the image, one or more main processes of the containerized application are identified. The one or more main processes comprise a first subset of a plurality of processes of the containerized application. Within a sandbox environment, the containerized application is started. Based on the started application within the sandbox environment, a second subset of processes within the plurality is determined. The second subset includes one or more dependent processes associated with the first subset. A third subset of processes within the plurality is determined. The third subset excludes the first and second subsets and is associated with a vulnerability list. According to the third subset, a mitigated image for the containerized application is generated.Type: ApplicationFiled: January 26, 2021Publication date: July 28, 2022Inventors: Piotr P. Godowski, Szymon Kowalczyk, Michal Paluch, Tomasz Hanusiak, Andrzej Pietrzak
-
Publication number: 20220179673Abstract: One or more computer processors responsive to a hypervisor data request, generate an encrypted set of hypervisor data indicating hypervisor hardware details using a plurality of respective asymmetric encryption keys to tag the generated set of encrypted hypervisor data with a timestamp at a time of encryption. The one or more computer processors decrypt the tagged set of encrypted hypervisor data utilizing a software asset manager and the plurality of respective asymmetric encryption keys determined valid based on a threshold time period and the tagged timestamp. The one or more computer processors validate the set of decrypted hypervisor data utilizing corresponding checksums to determine whether the set of encrypted hypervisor data was successfully decrypted. The one or more computer processors sanitize the validated hypervisor data based on a corresponding software license.Type: ApplicationFiled: December 3, 2020Publication date: June 9, 2022Inventors: Szymon Kowalczyk, Andrzej Pietrzak, Michal Paluch, Tomasz Hanusiak, PIOTR P. GODOWSKI
-
Patent number: 11347900Abstract: An example operation may include one or more of detecting a web session within an open window of a web browser on a user device, monitoring for user activity on the user device with respect to the web browser, determining there has been a lack of user activity with respect to the web browser for a predetermined amount of time based on the monitoring of the user activity, and temporarily concealing content within the open window of the web browser in response to the lack of user activity.Type: GrantFiled: January 10, 2020Date of Patent: May 31, 2022Assignee: International Business Machines CorporationInventors: Piotr P. Godowski, Michal Paluch, Tomasz Hanusiak, Szymon Kowalczyk
-
Publication number: 20220091865Abstract: Containerized software discover and identification can include discovering a plurality of container remnants by electronically scanning portions of computer memory of at least one computer system of one or more of computing nodes, the portions of computer memory being allocated to persistent storage of computer data, and each container remnant containing computer data providing a record of system-generated execution attributes generated in response to execution of one or more containerized applications. One or more inactive container remnants unutilized by a currently running containerized application can be identified among the plurality of container remnants. Each inactive container remnant can be categorized, the categorizing being based on system-generated execution attributes contained in each inactive container remnant.Type: ApplicationFiled: September 21, 2020Publication date: March 24, 2022Inventors: Piotr P. Godowski, Michal Paluch, Tomasz Hanusiak, Szymon Kowalczyk, Andrzej Pietrzak
-
Publication number: 20220091866Abstract: Containerized software discover and identification can include discovering a plurality of container remnants by electronically scanning portions of computer memory of at least one computer system of one or more of computing nodes, the portions of computer memory being allocated to persistent storage of computer data, and each container remnant containing computer data providing a record of system-generated execution attributes generated in response to execution of one or more containerized applications. One or more inactive container remnants unutilized by a currently running containerized application can be identified among the plurality of container remnants. Each inactive container remnant can be categorized, the categorizing being based on system-generated execution attributes contained in each inactive container remnant.Type: ApplicationFiled: December 24, 2020Publication date: March 24, 2022Inventors: Piotr P. Godowski, Michal Paluch, Tomasz Hanusiak, Szymon Kowalczyk, Andrzej Pietrzak
-
Patent number: 11277327Abstract: Aspects of the present invention disclose a method, computer program product, and system for determining recommendations for actions based on analysis of a device. The method includes retrieving information associated with a device from one or more databases. The method further includes determining information relevant to device performance as a function of an analysis of the retrieved information associated with the device, where the information relevant to device performance includes one or more factors related to an expected device performance. The method further includes determining a frequency of repair and replacement of one or more components of the device. The method further includes determining a recommendation of an action based on a comparison of an expected frequency of replacement and repair of the components of the device to the determined replacement and repair of the components of the device.Type: GrantFiled: October 11, 2019Date of Patent: March 15, 2022Assignee: International Business Machines CorporationInventors: Tomasz Hanusiak, Konrad W. Komnata, Jaroslaw Osinski, Grzegorz P. Szczepanik
-
Patent number: 11238014Abstract: The present invention generally relates to web applications, and, more particularly, to a distributed virtual control system (VCS) configured to track changes by users to web applications. For this purpose, a system includes a user device configured to access a web server, which includes a web application stored in the web server, wherein the web application is accessible by another user device to make changes to the web application, which changes are stored in a historical collection of versions of the web application in an original repository. The user device is configured to allow the user device to access the historical collection of versions of the web application in the original repository, and to store the changes to the web application made by the other user device in the historical collection of versions of the web application in a first local repository in the user device.Type: GrantFiled: December 4, 2018Date of Patent: February 1, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Krzysztof Rudek, Tomasz Hanusiak, Grzegorz P. Szczepanik, Konrad W. Komnata
-
Patent number: 11157583Abstract: A method for detecting software installed on a computer may be provided. The method may comprise obtaining a default user identifier, collecting an installed user identifier, performing an identifier comparison by comparing the installed user identifier with the default user identifier and determining whether an installed user identifier matches a default user identifier, assigning a probability value based on the identifier comparison, performing a threshold comparison of the probability value to the a predetermined threshold value, determining whether the probability value exceeds the threshold value, and in response to determining that the probability value exceeds the threshold value, concluding that the software has been installed on the computer system.Type: GrantFiled: September 14, 2018Date of Patent: October 26, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lukasz Jakub Palus, Grzegorz P. Szczepanik, Krzysztof Rudek, Tomasz Hanusiak
-
Patent number: 11157460Abstract: A method, apparatus, computer system, and computer program product for receiving, by a computer system, a usage request to use a subset of the objects from a client data processing system, wherein the objects are stored in a data repository. Responsive to receiving the usage request, the method transfers, by the computer system, the subset of the objects to the client data processing system and responsive to transferring the subset of the objects to the client data processing system, generating, by the computer system, an object transfer record, wherein the object transfer record describes the subset of the objects sent to the client data processing system. The method manages a utilization of the subset of the objects on the client data processing system utilizing the object transfer record.Type: GrantFiled: December 6, 2017Date of Patent: October 26, 2021Assignee: International Business Machines CorporationInventors: Tomasz Hanusiak, Konrad W. Komnata, Jaroslaw Osinski, Grzegorz P. Szczepanik
-
Publication number: 20210303545Abstract: Technology for logging application usage based on monitoring of read or change operations on database elements and then using the information from log data to determine application usage states (for example, active, inactive) in time.Type: ApplicationFiled: March 26, 2020Publication date: September 30, 2021Inventors: Michal Paluch, Tomasz Hanusiak, Andrzej Pietrzak, Michal Maciej Zalas