Patents by Inventor Benjamin S. Terris
Benjamin S. Terris has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9331952Abstract: Provided are a computer program product, system, and method for modifying an assignment of nodes to roles in a computing environment. There are a plurality of resource thresholds for each of a plurality of roles, wherein each role defines a type of operations and node resource usage for the nodes, and a measurement of node resource usage for the nodes. For at least one of the node, operations are performed comprising: determining at least one of the roles assigned to the node; determining a role resource threshold for each role assigned to the node; determining whether the measured node resource usage at the node exceeds the determined role resource thresholds for each role assigned to the node, wherein the role having the determined resource threshold exceeded by the node resource usage comprises a role to adjust; and determining a modification of the assignment of nodes to the role to adjust.Type: GrantFiled: January 2, 2013Date of Patent: May 3, 2016Assignee: International Business Machines CorporationInventors: Nikhil Khandelwal, Benjamin S. Terris, Richard A. Welp
-
Patent number: 9319343Abstract: Provided are a computer program product, system, and method for modifying an assignment of nodes to roles in a computing environment. There are a plurality of resource thresholds for each of a plurality of roles, wherein each role defines a type of operations and node resource usage for the nodes, and a measurement of node resource usage for the nodes. For at least one of the node, operations are performed comprising: determining at least one of the roles assigned to the node; determining a role resource threshold for each role assigned to the node; determining whether the measured node resource usage at the node exceeds the determined role resource thresholds for each role assigned to the node, wherein the role having the determined resource threshold exceeded by the node resource usage comprises a role to adjust; and determining a modification of the assignment of nodes to the role to adjust.Type: GrantFiled: November 7, 2013Date of Patent: April 19, 2016Assignee: International Business Machines CorporationInventors: Nikhil Khandelwal, Benjamin S. Terris, Richard A. Welp
-
Patent number: 9043878Abstract: Multi-tiered distributed security authentication and filtering. One embodiment comprises managing user access to one or more computing resources, by centrally maintaining user subscription information comprising user authentication information and system authorization information, and providing relevant subscription information from the user subscription information to one or more remote computing systems. Managing user access further includes, in a remote computing system, authenticating a user login to the remote computing system based on user authentication information from said relevant subscription information, and upon user authentication, selectively authorizing user access to computing resources of the remote computing system based on system authorization information from said relevant subscription information.Type: GrantFiled: March 6, 2012Date of Patent: May 26, 2015Assignee: International Business Machines CorporationInventors: Benjamin S. Terris, Richard A. Welp
-
Publication number: 20140189085Abstract: Provided are a computer program product, system, and method for modifying an assignment of nodes to roles in a computing environment. There are a plurality of resource thresholds for each of a plurality of roles, wherein each role defines a type of operations and node resource usage for the nodes, and a measurement of node resource usage for the nodes. For at least one of the node, operations are performed comprising: determining at least one of the roles assigned to the node; determining a role resource threshold for each role assigned to the node; determining whether the measured node resource usage at the node exceeds the determined role resource thresholds for each role assigned to the node, wherein the role having the determined resource threshold exceeded by the node resource usage comprises a role to adjust; and determining a modification of the assignment of nodes to the role to adjust.Type: ApplicationFiled: January 2, 2013Publication date: July 3, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nikhil Khandelwal, Benjamin S. Terris, Richard A. Welp
-
Publication number: 20140189130Abstract: Provided are a computer program product, system, and method for modifying an assignment of nodes to roles in a computing environment. There are a plurality of resource thresholds for each of a plurality of roles, wherein each role defines a type of operations and node resource usage for the nodes, and a measurement of node resource usage for the nodes. For at least one of the node, operations are performed comprising: determining at least one of the roles assigned to the node; determining a role resource threshold for each role assigned to the node; determining whether the measured node resource usage at the node exceeds the determined role resource thresholds for each role assigned to the node, wherein the role having the determined resource threshold exceeded by the node resource usage comprises a role to adjust; and determining a modification of the assignment of nodes to the role to adjust.Type: ApplicationFiled: November 7, 2013Publication date: July 3, 2014Applicant: International Business Machines CorporationInventors: Nikhil Khandelwal, Benjamin S. Terris, Richard A. Welp
-
Patent number: 8694835Abstract: An apparatus for health monitoring includes a settings module, a field data module, a settings update module, and a monitoring module. The settings module is configured to store health monitoring settings for a plurality of monitored subsystems. The field data module is configured to receive field data, the field data comprising failure data of one or more systems of the same type as at least one of the monitored subsystems. The settings update module is configured to update the health monitoring settings stored by the settings module, wherein the health monitoring settings are updated based at least in part on the field data. The monitoring module is configured to perform one or more health monitoring tasks according to the health monitoring settings.Type: GrantFiled: September 21, 2011Date of Patent: April 8, 2014Assignee: International Business Machines CorporationInventors: Benjamin S. Terris, Richard A. Welp
-
Patent number: 8539285Abstract: According to one embodiment, a method for handling errors includes detecting that an error has occurred in a machine in a system, determining an error ID associated with the error, determining that the error should be reported to a host system for further analysis based on the error ID, determining that one or more actions should be taken by the system based on the error ID, and sending information corresponding to the error to the host system after it is determined that the error should be reported to the host system. In another embodiment, a system includes a processor and logic for performing the method. According to another embodiment, a computer program product includes a computer readable storage medium having computer readable code embodied therewith for performing the method. Other methods, systems, and computer program products are also described according to more embodiments.Type: GrantFiled: June 22, 2010Date of Patent: September 17, 2013Assignee: International Business Machines CorporationInventors: Thomas H. Daily, Nikhil Khandelwal, Stefan Lehmann, Jason A. Ogroski, Ricardo S. Padilla, Kerri R. Shotwell, Benjamin S. Terris, Steve P. Wallace, Richard A. Welp
-
Publication number: 20130239176Abstract: Multi-tiered distributed security authentication and filtering. One embodiment comprises managing user access to one or more computing resources, by centrally maintaining user subscription information comprising user authentication information and system authorization information, and providing relevant subscription information from the user subscription information to one or more remote computing systems. Managing user access further includes, in a remote computing system, authenticating a user login to the remote computing system based on user authentication information from said relevant subscription information, and upon user authentication, selectively authorizing user access to computing resources of the remote computing system based on system authorization information from said relevant subscription information.Type: ApplicationFiled: March 6, 2012Publication date: September 12, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Benjamin S. Terris, Richard A. Welp
-
Publication number: 20130073911Abstract: An apparatus for health monitoring includes a settings module, a field data module, a settings update module, and a monitoring module. The settings module is configured to store health monitoring settings for a plurality of monitored subsystems. The field data module is configured to receive field data, the field data comprising failure data of one or more systems of the same type as at least one of the monitored subsystems. The settings update module is configured to update the health monitoring settings stored by the settings module, wherein the health monitoring settings are updated based at least in part on the field data. The monitoring module is configured to perform one or more health monitoring tasks according to the health monitoring settings.Type: ApplicationFiled: September 21, 2011Publication date: March 21, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Benjamin S. Terris, Richard A. Welp
-
Publication number: 20120096279Abstract: A method to provide problem-based access to a computing device is disclosed herein. In one embodiment of the invention, such a method includes detecting a problem on a computing device. The method automatically generates a user account on the computing device in response to detecting the problem. The problem is then tied to the user account. A support provider is then notified of the problem and the user account associated with the problem. This user account may be assigned to a service technician to enable access to the computing device. The service technician may then log into the computing device using the user account and address the problem. A corresponding apparatus and computer program product are also disclosed herein.Type: ApplicationFiled: October 13, 2010Publication date: April 19, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robin D. Roberts, Benjamin S. Terris, Richard A. Welp
-
Publication number: 20110314339Abstract: According to one embodiment, a method for handling errors includes detecting that an error has occurred in a machine in a system, determining an error ID associated with the error, determining that the error should be reported to a host system for further analysis based on the error ID, determining that one or more actions should be taken by the system based on the error ID, and sending information corresponding to the error to the host system after it is determined that the error should be reported to the host system. In another embodiment, a system includes a processor and logic for performing the method. According to another embodiment, a computer program product includes a computer readable storage medium having computer readable code embodied therewith for performing the method. Other methods, systems, and computer program products are also described according to more embodiments.Type: ApplicationFiled: June 22, 2010Publication date: December 22, 2011Applicant: International Business Machines CorporationInventors: Thomas H. Daily, Nikhil Khandelwal, Stefan Lehmann, Jason A. Ogroski, Ricardo S. Padilla, Kerri R. Shotwell, Benjamin S. Terris, Steve P. Wallace, Richard A. Welp