Patents by Inventor David Chambliss

David Chambliss has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240094996
    Abstract: Information received from a graphical user interface (GUI) and a list of user-curated command line patterns are received by an auto-wrapper system, wherein the auto-wrapper system is associated with an analytics workflow service. A module including a parameter space having one or more parameters and options used in the list of user-curated command line patterns is generated, by the auto-wrapper system, wherein content for each parameter is derived from the parameter's presence in the list of user-curated command line patterns combined with the information received from a GUI.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 21, 2024
    Inventors: Mark Kunitomi, David Chambliss, Forest Dussault
  • Patent number: 10198455
    Abstract: A method, including partitioning a dataset into a first number of data units, and selecting, based on a sampling ratio, a second number of the data units. A hash value is calculated for each of the selected data units, and a first histogram is computed indicating a first duplication count for each of the calculated hash values. Based on respective frequencies of the calculated hash values, a second histogram is computed indicating an observed frequency for each of the first duplication counts in the first histogram, and based on the sampling ratio and the second histogram, a target function is derived. A third histogram that minimizes the target function is derived, the third histogram including, for the first number of the storage units, second duplication counts and a respective predicted frequency for each of the second duplication counts. Finally, a deduplication ratio is determined based on the third histogram.
    Type: Grant
    Filed: January 13, 2016
    Date of Patent: February 5, 2019
    Assignee: International Business Machines Corporation
    Inventors: Danny Harnik, David Chambliss, Oded Margalit, Dmitry Sotnikov
  • Patent number: 10158623
    Abstract: A method and system for regulating access by an access program to a data object residing in a storage system, which may be used to protect against data theft in a storage server. The storage server receives, from a client node, a certificate request for a certificate pertaining to access of the data object by the access program. The storage server validates the certificate request and in response, generates the certificate and transmits the certificate to the client node. The certificate request and the certificate each include a signature of the access program and an identifier of the data object. The storage server receives from the client node an I/O request for access of the data object by the access program. The storage server determines whether the I/O request is valid or invalid and processes the I/O request with privileged handling or degraded handling, respectively.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: December 18, 2018
    Assignee: International Business Machines Corporation
    Inventors: David Chambliss, Rhonda L. Childress, Itzhack Goldberg, Nir Mor, Cliff Pickover, Neil Sondhi
  • Publication number: 20170199895
    Abstract: A method, including partitioning a dataset into a first number of data units, and selecting, based on a sampling ratio, a second number of the data units. A hash value is calculated for each of the selected data units, and a first histogram is computed indicating a first duplication count for each of the calculated hash values. Based on respective frequencies of the calculated hash values, a second histogram is computed indicating an observed frequency for each of the first duplication counts in the first histogram, and based on the sampling ratio and the second histogram, a target function is derived. A third histogram that minimizes the target function is derived, the third histogram including, for the first number of the storage units, second duplication counts and a respective predicted frequency for each of the second duplication counts. Finally, a deduplication ratio is determined based on the third histogram.
    Type: Application
    Filed: January 13, 2016
    Publication date: July 13, 2017
    Inventors: Danny Harnik, David Chambliss, Oded Margalit, Dmitry Sotnikov
  • Publication number: 20170093844
    Abstract: A method and system for regulating access by an access program to a data object residing in a storage system, which may be used to protect against data theft in a storage server. The storage server receives, from a client node, a certificate request for a certificate pertaining to access of the data object by the access program. The storage server validates the certificate request and in response, generates the certificate and transmits the certificate to the client node. The certificate request and the certificate each include a signature of the access program and an identifier of the data object. The storage server receives from the client node an I/O request for access of the data object by the access program. The storage server determines whether the I/O request is valid or invalid and processes the I/O request with privileged handling or degraded handling, respectively.
    Type: Application
    Filed: September 30, 2015
    Publication date: March 30, 2017
    Inventors: David Chambliss, Rhonda L. Childress, Itzhack Goldberg, Nir Mor, Cliff Pickover, Neil Sondhi
  • Publication number: 20080021996
    Abstract: A method and structure for a multi-workload storage system is disclosed that is adapted to determine if an additional workload can be placed on the storage system. The invention has storage elements and a proxy load generator connected to the storage elements. The proxy load generator is adapted to create a proxy workload based on an additional workload from a potential client. The proxy workload has a reduced duty cycle when compared to a duty cycle of said additional workload. A control server is connected to the storage elements and the proxy load generator. The control server applies the proxy workload to the storage elements during discontinuous time slices.
    Type: Application
    Filed: October 4, 2007
    Publication date: January 24, 2008
    Inventors: David Chambliss, Divyesh Jadav
  • Publication number: 20060047542
    Abstract: A method to optimize revenue realized under multiple service level agreements with multiple data storage clients is disclosed. The method provides an information storage and retrieval system. The method includes entering into (N) service level agreements to provide data storage services for (N) applications using the information storage and retrieval system, where each of the (N) service level agreements specifies an average maximum response time RTSLA. The method calculates for each value of (j), the value per unit throughput ?j for the (j)th application, and then determines for each value of (j) the optimum data flow rate x(j)OPT. The method estimates, for each value of (j), a maximum data flow rate X(j)MAX that the (j)th application can utilize, and determines, for each value of (j), if x(j)OPT equals X(j)MAX.
    Type: Application
    Filed: August 27, 2004
    Publication date: March 2, 2006
    Inventors: John Aschoff, David Chambliss, Bruce McNutt
  • Publication number: 20050076154
    Abstract: Provided are a method, system, and program for managing a network providing Input/Output (I/O) paths between a plurality of host systems and storage volumes in storage systems. An application service connection definition is provided for each connection from a host to a storage volume. At least one service level guarantee definition is provided indicating performance criteria to satisfy service requirements included in at least one service level agreement with at least one customer for network resources. Each service level guarantee definition is associated with at least one application service connection definition. Monitoring is performed as to whether Input/Output (I/O) requests transmitted through the multiple I/O paths satisfy performance criteria indicated in the service level guarantee definition associated with the I/O paths.
    Type: Application
    Filed: September 15, 2003
    Publication date: April 7, 2005
    Inventors: David Chambliss, Bruce Hillsberg, Divyesh Jadav, Jaishankar Menon, Prashant Pandey, Jian Xu, Ramachandran Menon