Patents by Inventor David B. LeGendre
David B. LeGendre has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10673937Abstract: A computer program product is provided for dynamic record-level sharing (RLS) provisioning. The computer program product comprises a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a processor to cause the processor to receive, at a local system, a request to access a data set, and determine to ship the request to a receiving system. The program instructions further cause the processor to gather utilization information of at least one other system, and identify, based on the utilization information of the at least one other system, the receiving system from the at least one other system.Type: GrantFiled: August 27, 2015Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Neal E. Bohling, David B. LeGendre, David C. Reed, Max D. Smith
-
Publication number: 20170063976Abstract: A computer program product is provided for dynamic record-level sharing (RLS) provisioning. The computer program product comprises a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a processor to cause the processor to receive, at a local system, a request to access a data set, and determine to ship the request to a receiving system. The program instructions further cause the processor to gather utilization information of at least one other system, and identify, based on the utilization information of the at least one other system, the receiving system from the at least one other system.Type: ApplicationFiled: August 27, 2015Publication date: March 2, 2017Inventors: Neal E. Bohling, David B. LeGendre, David C. Reed, Max D. Smith
-
Patent number: 9384118Abstract: A method, system, and computer program product for identifying an overlay of a data processing target structure in a computing environment is provided. At least one of examining a mapping macro for the target structure with a set of valid ranges, comparing the set of valid ranges with the target structure to identify a string of at least one first invalid value and a last invalid value and locate invalid regions of the target structure, and examining executable code associated with the target structure, comparing at least one unchanged module against at least one additional module exhibiting an overlay characteristic to identify the string of the at least one first invalid value and the last invalid value and locate invalid regions of the target structure, is performed.Type: GrantFiled: October 29, 2012Date of Patent: July 5, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Herman Aranguren, David B. LeGendre, David C. Reed, Max D. Smith
-
Patent number: 9354820Abstract: Embodiments of the disclosure are directed toward a method, a system, and a computer program product for managing virtual storage access method (VSAM) data sets on performance tiers. The method can be used with VSAM data sets. The method can include determining a usage metric for a particular control area from the plurality of control areas. The method can also include prioritizing the particular control areas based on a determined usage metric. The method can also include assigning a prioritized control area to a performance tier of the plurality of tiers as a function of a prioritization of the particular control area and a performance criteria for the performance tier by moving the prioritized control area to the performance tier and updating an index record that associates the prioritized control area to the performance tier.Type: GrantFiled: June 28, 2013Date of Patent: May 31, 2016Assignee: GLOBALFOUNDRIES INC.Inventors: Neal E. Bohling, David B. LeGendre, David C. Reed, Max D. Smith
-
Patent number: 9021220Abstract: A method, system and computer readable medium that identify orphan storage and release the orphaned storage before application or system outages can result. More specifically, in certain embodiments, a method, system and computer readable medium periodically scan through common memory storage and identifies those areas that are no longer associated with a running task or have been allocated for longer than a running task with a matching task address. These areas are then identified as potentially orphaned storage locations.Type: GrantFiled: August 1, 2012Date of Patent: April 28, 2015Assignee: International Business Machines CorporationInventors: David B. LeGendre, David C. Reed, Esteban Rios, Max D. Smith
-
Publication number: 20150006832Abstract: Embodiments of the disclosure are directed toward a method, a system, and a computer program product for managing virtual storage access method (VSAM) data sets on performance tiers. The method can be used with VSAM data sets. The method can include determining a usage metric for a particular control area from the plurality of control areas. The method can also include prioritizing the particular control areas based on a determined usage metric. The method can also include assigning a prioritized control area to a performance tier of the plurality of tiers as a function of a prioritization of the particular control area and a performance criteria for the performance tier by moving the prioritized control area to the performance tier and updating an index record that associates the prioritized control area to the performance tier.Type: ApplicationFiled: June 28, 2013Publication date: January 1, 2015Inventors: Neal E. Bohling, David B. LeGendre, David C. Reed, Max D. Smith
-
Patent number: 8903993Abstract: An approach to improving performance of a target system is disclosed. The approach may involve determining how similar a target system being considered is to other systems in use by other clients. For each of these other separate systems, the approach may involve determining the differences between the performance of the target system and the performance of the separate system, accounting for the level of similarity. A report can be generated that identifies performance values of the target system that are outside an acceptable range, which is based on the performance of the other separate systems. Based on this report, the administrator of the target system can consider configuration changes and upgrades to improve performance of the target system.Type: GrantFiled: June 1, 2012Date of Patent: December 2, 2014Assignee: International Business Machines CorporationInventors: David B. LeGendre, Dash D. Miller, David C. Reed, Max D. Smith
-
Publication number: 20140040586Abstract: A method, system and computer readable medium that identify orphan storage and release the orphaned storage before application or system outages can result. More specifically, in certain embodiments, a method, system and computer readable medium periodically scan through common memory storage and identifies those areas that are no longer associated with a running task or have been allocated for longer than a running task with a matching task address. These areas are then identified as potentially orphaned storage locations.Type: ApplicationFiled: August 1, 2012Publication date: February 6, 2014Applicant: International Business Machines CorporationInventors: David B. LeGendre, David C. Reed, Esteban Rios, Max D. Smith
-
Publication number: 20130326051Abstract: An approach to improving performance of a target system is disclosed. The approach may involve determining how similar a target system being considered is to other systems in use by other clients. For each of these other separate systems, the approach may involve determining the differences between the performance of the target system and the performance of the separate system, accounting for the level of similarity. A report can be generated that identifies performance values of the target system that are outside an acceptable range, which is based on the performance of the other separate systems. Based on this report, the administrator of the target system can consider configuration changes and upgrades to improve performance of the target system.Type: ApplicationFiled: June 1, 2012Publication date: December 5, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David B. LeGendre, Dash D. Miller, David C. Reed, Max D. Smith
-
Publication number: 20120030521Abstract: A method for selectively generating trace data is disclosed. Such a method includes executing a first module on a processor. The processor is operably coupled to a memory storing the first module and one or more branch modules. The method further includes detecting the execution of an instruction of the first module to execute a branch module. In response to detecting execution of the instruction, traces of branch modules subsequently executed by the processor are generated. Upon detecting a return of execution by the processor to the first module, the generation of traces is terminated and a trace report is generated. A corresponding apparatus and computer program product are also disclosed herein.Type: ApplicationFiled: July 30, 2010Publication date: February 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Herman Aranguren, David B. LeGendre, David C. Reed, Max D. Smith
-
Publication number: 20110191565Abstract: A method for automatically optimizing an allocation amount for a data set includes receiving an extend request, specifying an allocation amount, for a data set in a storage pool. The method increments a counter in response to receiving the extend request. In the event the counter has reached a threshold value, the method automatically increases the allocation amount of the extend request, such as by multiplying the allocation amount by a multiplier. In the event the allocation amount is larger than a largest free extent in the storage pool, the method automatically decreases the allocation amount of the extend request to correspond to the largest available free extent. Such a method reduces or eliminates the chance that an extend request will fail, and reduces overhead associated with extending and consolidating extents. A corresponding apparatus and computer program product are also disclosed herein.Type: ApplicationFiled: February 2, 2010Publication date: August 4, 2011Applicant: International Business Machines CorporationInventors: David B. LeGendre, Franklin E. McCune, David C. Reed, Max D. Smith