Patents by Inventor Brad D. Stilwell
Brad D. Stilwell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11153273Abstract: A method includes provisioning, by a cloud provisioning server, a first instance based on a template. The template belongs to a tenant, and the first instance includes one of an instantiated software and an instantiated computing service. The method also includes determining a prefix. The determined prefix is shared by a second instance that is also provisioned based on the template of the tenant. The method also includes generating a name for the first provisioned instance. The generated name includes the determined prefix.Type: GrantFiled: December 13, 2016Date of Patent: October 19, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nicholas Carbone, John L. Czukkermann, Michael D. Essenmacher, Kirsten B. McDonald, Gary S. Puchkoff, Donald W. Schmidt, Hiren R. Shah, Brad D. Stilwell, Andrew P. Wack
-
Patent number: 11044145Abstract: A method includes configuring, by a cloud provisioning server, a first cloud domain. The first cloud domain and a second cloud domain use at least one of the same operating system and the same system resource pool. The method also includes configuring a tenant within the first cloud domain. The tenant is isolated from tenants of the second cloud domain. Resources used by the configured tenant are not shared with tenants of the second cloud domain.Type: GrantFiled: December 13, 2016Date of Patent: June 22, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nicholas Carbone, John L. Czukkermann, Michael D. Essenmacher, Kirsten B. McDonald, Gary S. Puchkoff, Donald W. Schmidt, Hiren R. Shah, Brad D. Stilwell, Andrew P. Wack
-
Patent number: 10725894Abstract: Embodiments of the invention include methods and systems for improving test case coverage. Aspects of the invention include executing, by a processor, a first test case, where the first test case includes a plurality of system calls to an operating system. Prior to execution of each system call in the plurality of system calls in the first test case, executing, by the processor, a pre-exit instruction. Responsive to execution of the pre-exit instruction, collecting pre-exit system call data regarding each system call in the plurality of system calls for the first test case. The processor executes a post-exit instruction after completion of each system call in the plurality of system calls and responsive to execution of the post-exit instruction, collects post-exit system call data regarding each system call in the plurality of system calls for the first test case.Type: GrantFiled: October 4, 2017Date of Patent: July 28, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dominic DeMarco, Christopher Loers, Alexander Smith, Brad D. Stilwell
-
Patent number: 10725895Abstract: Embodiments of the invention include methods and systems for improving test case coverage. Aspects of the invention include executing, by a processor, a first test case, where the first test case includes a plurality of system calls to an operating system. Prior to execution of each system call in the plurality of system calls in the first test case, executing, by the processor, a pre-exit instruction. Responsive to execution of the pre-exit instruction, collecting pre-exit system call data regarding each system call in the plurality of system calls for the first test case. The processor executes a post-exit instruction after completion of each system call in the plurality of system calls and responsive to execution of the post-exit instruction, collects post-exit system call data regarding each system call in the plurality of system calls for the first test case.Type: GrantFiled: November 3, 2017Date of Patent: July 28, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dominic DeMarco, Christopher Loers, Alexander Smith, Brad D. Stilwell
-
Patent number: 10623252Abstract: A method includes provisioning, by a cloud provisioning server, an instance of a software resource or service for an end user. The provisioning is based on a template for the software resource or service. The template includes, at least, attribute data, and the attribute data is structured according to an action schema. The method also includes storing the action schema in association with the provisioned instance. The attribute data and the action schema determine at least one action of the provisioned instance. The method also includes performing the at least one action of the provisioned instance.Type: GrantFiled: December 13, 2016Date of Patent: April 14, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nicholas Carbone, John L. Czukkermann, Michael D. Essenmacher, Kirsten B. McDonald, Gary S. Puchkoff, Donald W. Schmidt, Hiren R. Shah, Brad D. Stilwell, Andrew P. Wack
-
Patent number: 10547506Abstract: A method includes configuring, by a cloud provisioning server, a first user identity to execute a provisioning to provision an instance. The instance to be provisioned includes one of an instantiated software resource and a computing service. The method also includes configuring a second user identity to be an approver of the provisioning. The method also includes performing provisioning of the instance. The provisioning is executed under the first user identity, and the second user identity has provided approval of the provisioning.Type: GrantFiled: December 13, 2016Date of Patent: January 28, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Marie R. Buzzetti, Nicholas Carbone, John L. Czukkermann, Michael D. Essenmacher, Galina Gorelik, Kirsten B. McDonald, Gary S. Puchkoff, Donald W. Schmidt, Hiren R. Shah, Brad D. Stilwell, Andrew P. Wack
-
Patent number: 10430322Abstract: Embodiments of the invention include systems for testing pre and post system call exits. Aspects include executing a first test case comprises system calls and the first test case initializes a common buffer and stores system call parameters for each of the system calls. A monitoring test case is executed comprising: a pre-exit instruction that is inserted before each system call in the first test case. A post-exit instruction is inserted after each of the system calls in the first test case. Execution of the pre-exit instruction is determined prior to an execution of each system call. A first bit location is set in the common buffer to one, based on determining the pre-exit instruction executes. The system call is executed and execution of the post-exit instruction is determined. A second bit location in the common buffer is set to one based on determining that the post-exit instruction executes.Type: GrantFiled: October 30, 2017Date of Patent: October 1, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dominic DeMarco, Christopher Loers, Alexander Smith, Brad D. Stilwell
-
Patent number: 10346293Abstract: Embodiments of the invention include systems for testing pre and post system call exits. Aspects include executing a first test case comprises system calls and the first test case initializes a common buffer and stores system call parameters for each of the system calls. A monitoring test case is executed comprising: a pre-exit instruction that is inserted before each system call in the first test case. A post-exit instruction is inserted after each of the system calls in the first test case. Execution of the pre-exit instruction is determined prior to an execution of each system call. A first bit location is set in the common buffer to one, based on determining the pre-exit instruction executes. The system call is executed and execution of the post-exit instruction is determined. A second bit location in the common buffer is set to one based on determining that the post-exit instruction executes.Type: GrantFiled: October 4, 2017Date of Patent: July 9, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dominic DeMarco, Christopher Loers, Alexander Smith, Brad D. Stilwell
-
Publication number: 20190102285Abstract: Embodiments of the invention include systems for testing pre and post system call exits. Aspects include executing a first test case comprises system calls and the first test case initializes a common buffer and stores system call parameters for each of the system calls. A monitoring test case is executed comprising: a pre-exit instruction that is inserted before each system call in the first test case. A post-exit instruction is inserted after each of the system calls in the first test case. Execution of the pre-exit instruction is determined prior to an execution of each system call. A first bit location is set in the common buffer to one, based on determining the pre-exit instruction executes. The system call is executed and execution of the post-exit instruction is determined. A second bit location in the common buffer is set to one based on determining that the post-exit instruction executes.Type: ApplicationFiled: October 30, 2017Publication date: April 4, 2019Inventors: Dominic DeMarco, Christopher Loers, Alexander Smith, Brad D. Stilwell
-
Publication number: 20190102282Abstract: Embodiments of the invention include methods and systems for improving test case coverage. Aspects of the invention include executing, by a processor, a first test case, where the first test case includes a plurality of system calls to an operating system. Prior to execution of each system call in the plurality of system calls in the first test case, executing, by the processor, a pre-exit instruction. Responsive to execution of the pre-exit instruction, collecting pre-exit system call data regarding each system call in the plurality of system calls for the first test case. The processor executes a post-exit instruction after completion of each system call in the plurality of system calls and responsive to execution of the post-exit instruction, collects post-exit system call data regarding each system call in the plurality of system calls for the first test case.Type: ApplicationFiled: November 3, 2017Publication date: April 4, 2019Inventors: Dominic DeMarco, Christopher Loers, Alexander Smith, Brad D. Stilwell
-
Publication number: 20190102281Abstract: Embodiments of the invention include methods and systems for improving test case coverage. Aspects of the invention include executing, by a processor, a first test case, where the first test case includes a plurality of system calls to an operating system. Prior to execution of each system call in the plurality of system calls in the first test case, executing, by the processor, a pre-exit instruction. Responsive to execution of the pre-exit instruction, collecting pre-exit system call data regarding each system call in the plurality of system calls for the first test case. The processor executes a post-exit instruction after completion of each system call in the plurality of system calls and responsive to execution of the post-exit instruction, collects post-exit system call data regarding each system call in the plurality of system calls for the first test case.Type: ApplicationFiled: October 4, 2017Publication date: April 4, 2019Inventors: Dominic DeMarco, Christopher Loers, Alexander Smith, Brad D. Stilwell
-
Publication number: 20190102284Abstract: Embodiments of the invention include systems for testing pre and post system call exits. Aspects include executing a first test case comprises system calls and the first test case initializes a common buffer and stores system call parameters for each of the system calls. A monitoring test case is executed comprising: a pre-exit instruction that is inserted before each system call in the first test case. A post-exit instruction is inserted after each of the system calls in the first test case. Execution of the pre-exit instruction is determined prior to an execution of each system call. A first bit location is set in the common buffer to one, based on determining the pre-exit instruction executes. The system call is executed and execution of the post-exit instruction is determined. A second bit location in the common buffer is set to one based on determining that the post-exit instruction executes.Type: ApplicationFiled: October 4, 2017Publication date: April 4, 2019Inventors: Dominic DeMarco, Christopher Loers, Alexander Smith, Brad D. Stilwell
-
Patent number: 10061614Abstract: Embodiments include method, systems and computer program products for resource management of untrusted programs. In some embodiments, a first request to process an asynchronous event by an untrusted application may be received. The first request may include a host memory address. A counter may be incremented in response to receiving the first request. A device memory address may be retrieved from a device translation table using the host memory address. Processing the first request by a device using the device memory address may be facilitated. A second request to unregister the host memory address may be received. The counter may be determined to be non-zero. An action may be implemented in response to determining that the counter is non-zero.Type: GrantFiled: November 14, 2017Date of Patent: August 28, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dale F. Riedy, Anthony T. Sofia, Brad D. Stilwell
-
Publication number: 20180167267Abstract: A method includes provisioning, by a cloud provisioning server, an instance of a software resource or service for an end user. The provisioning is based on a template for the software resource or service. The template includes, at least, attribute data, and the attribute data is structured according to an action schema. The method also includes storing the action schema in association with the provisioned instance. The attribute data and the action schema determine at least one action of the provisioned instance. The method also includes performing the at least one action of the provisioned instance.Type: ApplicationFiled: December 13, 2016Publication date: June 14, 2018Inventors: Nicholas Carbone, John L. Czukkermann, Michael D. Essenmacher, Kirsten B. McDonald, Gary S. Puchkoff, Donald W. Schmidt, Hiren R. Shah, Brad D. Stilwell, Andrew P. Wack
-
Publication number: 20180167273Abstract: A method includes configuring, by a cloud provisioning server, a first user identity to execute a provisioning to provision an instance. The instance to be provisioned includes one of an instantiated software resource and a computing service. The method also includes configuring a second user identity to be an approver of the provisioning. The method also includes performing provisioning of the instance. The provisioning is executed under the first user identity, and the second user identity has provided approval of the provisioning.Type: ApplicationFiled: December 13, 2016Publication date: June 14, 2018Inventors: Marie R. Buzzetti, Nicholas Carbone, John L. Czukkermann, Michael D. Essenmacher, Galina Gorelik, Kirsten B. McDonald, Gary S. Puchkoff, Donald W. Schmidt, Hiren R. Shah, Brad D. Stilwell, Andrew P. Wack
-
Publication number: 20180167358Abstract: A method includes provisioning, by a cloud provisioning server, a first instance based on a template. The template belongs to a tenant, and the first instance includes one of an instantiated software and an instantiated computing service. The method also includes determining a prefix. The determined prefix is shared by a second instance that is also provisioned based on the template of the tenant. The method also includes generating a name for the first provisioned instance. The generated name includes the determined prefix.Type: ApplicationFiled: December 13, 2016Publication date: June 14, 2018Inventors: Nicholas Carbone, John L. Czukkermann, Michael D. Essenmacher, Kirsten B. McDonald, Gary S. Puchkoff, Donald W. Schmidt, Hiren R. Shah, Brad D. Stilwell, Andrew P. Wack
-
Publication number: 20180167270Abstract: A method includes configuring, by a cloud provisioning server, a first cloud domain. The first cloud domain and a second cloud domain use at least one of the same operating system and the same system resource pool. The method also includes configuring a tenant within the first cloud domain. The tenant is isolated from tenants of the second cloud domain. Resources used by the configured tenant are not shared with tenants of the second cloud domain.Type: ApplicationFiled: December 13, 2016Publication date: June 14, 2018Inventors: Nicholas Carbone, John L. Czukkermann, Michael D. Essenmacher, Kirsten B. McDonald, Gary S. Puchkoff, Donald W. Schmidt, Hiren R. Shah, Brad D. Stilwell, Andrew P. Wack
-
Publication number: 20180060126Abstract: Embodiments include method, systems and computer program products for resource management of untrusted programs. In some embodiments, a first request to process an asynchronous event by an untrusted application may be received. The first request may include a host memory address. A counter may be incremented in response to receiving the first request. A device memory address may be retrieved from a device translation table using the host memory address. Processing the first request by a device using the device memory address may be facilitated. A second request to unregister the host memory address may be received. The counter may be determined to be non-zero. An action may be implemented in response to determining that the counter is non-zero.Type: ApplicationFiled: November 14, 2017Publication date: March 1, 2018Inventors: DALE F. RIEDY, ANTHONY T. SOFIA, BRAD D. STILWELL
-
Patent number: 9858119Abstract: Embodiments include method, systems and computer program products for resource management of untrusted programs. In some embodiments, a first request to process an asynchronous event by an untrusted application may be received. The first request may include a host memory address. A counter may be incremented in response to receiving the first request. A device memory address may be retrieved from a device translation table using the host memory address. Processing the first request by a device using the device memory address may be facilitated. A second request to unregister the host memory address may be received. The counter may be determined to be non-zero. An action may be implemented in response to determining that the counter is non-zero.Type: GrantFiled: December 8, 2015Date of Patent: January 2, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dale F. Riedy, Anthony T. Sofia, Brad D. Stilwell
-
Publication number: 20170161107Abstract: Embodiments include method, systems and computer program products for resource management of untrusted programs. In some embodiments, a first request to process an asynchronous event by an untrusted application may be received. The first request may include a host memory address. A counter may be incremented in response to receiving the first request. A device memory address may be retrieved from a device translation table using the host memory address. Processing the first request by a device using the device memory address may be facilitated. A second request to unregister the host memory address may be received. The counter may be determined to be non-zero. An action may be implemented in response to determining that the counter is non-zero.Type: ApplicationFiled: December 8, 2015Publication date: June 8, 2017Inventors: Dale F. Riedy, Anthony T. Sofia, Brad D. Stilwell