Patents by Inventor Gary Dale Williams

Gary Dale Williams has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100241688
    Abstract: A method, system, and computer usable program product for transmitting information about dynamic group memberships of an entry stored in a computer memory are provided in the illustrative embodiments. A set of dynamic group filters is received from a server in a distributed data environment. The set of dynamic group filters provides a set of attributes. A determination is made whether the entry includes a subset of the set of attributes. A request for dynamic group memberships of the entry is sent to the server. The request includes the subset of attributes and excludes attributes not used by any of the dynamic group filters. Information about at least one dynamic group of which the entry is a member is received for evaluation. A proxy server may receive the request for dynamic group filters and distribute the request to one or more servers in a distributed data environment.
    Type: Application
    Filed: March 19, 2009
    Publication date: September 23, 2010
    Applicant: International Business Machines Corporation
    Inventors: Kristin Marie Hazlewood, Yogesh Vilas Golwalkar, Gary Dale Williams
  • Patent number: 7801848
    Abstract: Illustrative embodiments provide a method for redistributing data in a distributed database. The method provides a set of servers, each of which having a respective portion of the distributed database resident thereon, and for routing requests to the set of servers by means of a proxy server. Responsive to a redistribution request to redistribute the distributed database among the set of servers from a first distribution to a second distribution, setting a flag in the proxy server indicating that redistribution is in progress. Further storing configuration data for the first distribution and the second distribution in the proxy server, and redistributing the data in the distributed database in accordance with the configuration data.
    Type: Grant
    Filed: August 2, 2007
    Date of Patent: September 21, 2010
    Assignee: International Business Machines Corporation
    Inventors: Kristin Marie Hazlewood, John Mark McConaughy, Gary Dale Williams
  • Publication number: 20090254579
    Abstract: A method, system, and computer usable program product for deploying directory instances are provided in the illustrative embodiments. A configuration of an existing directory instance is cloned to the new directory instance. The existing directory instance may execute in a first data processing system and the new directory instance may execute in a second data processing system. A schema of the existing directory instance is cloned to the new directory instance. A determination is made whether the new directory instance is a peer of the existing directory instance. Data from the existing directory instance is cloned to the new directory instance if the new directory instance is a peer of the existing directory instance. The new directory instance is made operational in a directory topology.
    Type: Application
    Filed: April 3, 2008
    Publication date: October 8, 2009
    Applicant: International Business Machines Corporation
    Inventors: Kristin Marie Hazlewood, Shevaun-Ann Michelle Fontenot, Yogesh Vilas Golwalkar, Gary Dale Williams
  • Publication number: 20090216779
    Abstract: A method, system, and computer usable program product for transferring messages to a directory are provided in the illustrative embodiments. A listing of message templates that is stored in a computer usable storage medium is received. A list of messages is received. The listing of message templates is loaded in a directory. The directory executes in a data processing system and is configured to store messages. The list of messages are loaded in the directory. Messages are loaded in the directory by receiving a list of messages in the directory. A message is selected and identified from the list of messages. A determination is made if the message corresponds to an existing base message entry in the directory. A message instance entry is created in relation to the existing base message entry if the message corresponds to an existing base message entry and the message is otherwise handled if not.
    Type: Application
    Filed: February 25, 2008
    Publication date: August 27, 2009
    Applicant: International Business Machines Corporations
    Inventors: Kristin Marie Hazlewood, Andy Hazlewood, John Mark McConaughy, Gary Dale Williams
  • Publication number: 20090193013
    Abstract: A method, system, and computer usable program product for storing messages in a directory executing in a data processing system are provided in the illustrative embodiments. A message is received over a network and identified in the directory. A base message entry that corresponds to the message is selected in a hierarchy of entries in the directory. A message instance entry for the message is created, such that the message instance entry becomes a child entry of the base message entry in the hierarchy.
    Type: Application
    Filed: January 30, 2008
    Publication date: July 30, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kristin Marie Hazlewood, Andy Hazlewood, John Mark McConaughy, Gary Dale Williams
  • Publication number: 20090182855
    Abstract: In association with a data processing system that includes one or more servers, one or more clients and a partitionable distributed directory contained in a database, a computer implemented method is provided for selectively processing data entries that reside in the directory. The method comprises the steps of generating a request to perform an operation on each data entry in a specified group of intended entries, and specifying a hashing control index that uniquely identifies each entry of the specified group, and excludes all other entries. The requested operation is applied only to data entries in the directory that are identified by the specified hashing control index.
    Type: Application
    Filed: January 14, 2008
    Publication date: July 16, 2009
    Inventors: Yogesh Vilas Golwalkar, Kristin Marie Hazlewood, Magesh Rajamani, Gary Dale Williams
  • Publication number: 20090178105
    Abstract: A computer implemented method, data processing system, and computer program product for reducing the overhead associated with distributed password policy enforcement operations using a proxy server. when a proxy server provides a request from a client to a backend directory server, the proxy server determines whether a password policy check is required to be performed at the backend directory server. If a password policy check is not required to be performed at the backend directory server, the proxy server sends the client request together with a skip password policy control to the backend directory server. This skip password policy control informs the backend directory server to skip the password policy check on the client request.
    Type: Application
    Filed: January 9, 2008
    Publication date: July 9, 2009
    Inventors: Daw Feng, Kristin Marie Hazlewood, Gary Dale Williams
  • Publication number: 20090178106
    Abstract: A computer implemented method, data processing system, and computer program product for password policy enforcement in a distributed directory when policy information is distributed. When a proxy server is providing a request from a client to a backend directory server, the proxy server performs a series of LDAP operations on a targeted set of backend directory servers to collect password policy information applicable to a target user. The password policy information applicable to the target user is partitioned and distributed across the plurality of backend directory servers. When the password policy information for the target user has been collected, the proxy server evaluates the collected password policy information to determine an effective password policy for the target user. The proxy server then sends the request and subsequent requests with the effective password policy to a backend directory server.
    Type: Application
    Filed: January 9, 2008
    Publication date: July 9, 2009
    Inventors: DAW FENG, Kristin Marie Hazlewood, Gary Dale Williams
  • Publication number: 20090157777
    Abstract: Dynamically adding n partitions to a distributed directory setup having x existing servers by modifying the configuration file to include the n new servers and implementing a replication setup mechanism with agreements to x+n?1 servers. The migration to dynamically add partitions is carried out while continuing to serve clients.
    Type: Application
    Filed: December 13, 2007
    Publication date: June 18, 2009
    Inventors: Yogesh V. Golwalkar, Kristin M. Hazlewood, Magesh Rajamani, Gary Dale Williams
  • Publication number: 20090037427
    Abstract: Illustrative embodiments provide a method for redistributing data in a distributed database. The method provides a set of servers, each of which having a respective portion of the distributed database resident thereon, and for routing requests to the set of servers by means of a proxy server. Responsive to a redistribution request to redistribute the distributed database among the set of servers from a first distribution to a second distribution, setting a flag in the proxy server indicating that redistribution is in progress. Further storing configuration data for the first distribution and the second distribution in the proxy server, and redistributing the data in the distributed database in accordance with the configuration data.
    Type: Application
    Filed: August 2, 2007
    Publication date: February 5, 2009
    Inventors: Kristin Marie Hazlewood, John Mark McConaughy, Gary Dale Williams
  • Publication number: 20090019533
    Abstract: The invention describes techniques for enforcing password policy within a distributed directory environment that includes one or more distributed directory servers and a proxy server that acts as an intermediate agent between a client and the distributed directory environment. In one aspect, the proxy server is enhanced to support the passing (from the backend server to the client) of password policy controls. In particular, controls returned from a backend server are parsed and cached (for re-use) for the life of a given client connection. According to another aspect, the proxy server ensures that all compare operations for a single user's password are directed to the same backend server in the distributed directory environment. This insures that a user's most current password is used, and that failed operation counts, resets and operational attributes are up-to-date.
    Type: Application
    Filed: July 11, 2007
    Publication date: January 15, 2009
    Inventors: Kristin Marie Hazlewood, Daw Feng, Gary Dale Williams
  • Publication number: 20090019514
    Abstract: The invention describes techniques for enforcing password policy within a distributed directory environment that includes one or more distributed directory servers and a proxy server that acts as an intermediate agent between a client and the distributed directory environment. In one aspect, the proxy server is enhanced to support the passing (from the backend server to the client) of password policy controls. In particular, controls returned from a backend server are parsed and cached (for re-use) for the life of a given client connection. According to another aspect, the proxy server ensures that all compare operations for a single user's password are directed to the same backend server in the distributed directory environment. This insures that a user's most current password is used, and that failed operation counts, resets and operational attributes are up-to-date.
    Type: Application
    Filed: July 11, 2007
    Publication date: January 15, 2009
    Inventors: Kristin Marie Hazlewood, Daw Feng, Gary Dale Williams
  • Publication number: 20080216080
    Abstract: A method is presented for processing data in a multithreaded application to alleviate impaired or substandard performance conditions. Work items that are pending processing by the multithreaded application are placed into a data structure. The work items are processed by a plurality of threads within the multithreaded application in accordance with a first algorithm, e.g., first-in first-out (FIFO). A thread within the multithreaded application is configured apart from the plurality of threads such that it processes work items in accordance with a second algorithm that differs from the first algorithm, thereby avoiding the impairing condition. For example, the thread may process a pending work item only if it has a particular characteristic. The thread restricts its own processing of work items by intermittently evaluating workflow conditions for the plurality of threads; if the workflow conditions improve or are unimpaired, then the thread does not process any work items.
    Type: Application
    Filed: April 17, 2008
    Publication date: September 4, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark Joseph Cavage, Kristin M. Hazlewood, Richard Allyn Heller, Gary Dale Williams
  • Publication number: 20080189711
    Abstract: A method is presented for processing data in a multithreaded application to alleviate impaired or substandard performance conditions. Work items that are pending processing by the multithreaded application are placed into a data structure. The work items are processed by a plurality of threads within the multithreaded application in accordance with a first algorithm, e.g., first-in first-out (FIFO). A thread within the multithreaded application is configured apart from the plurality of threads such that it processes work items in accordance with a second algorithm that differs from the first algorithm, thereby avoiding the impairing condition. For example, the thread may process a pending work item only if it has a particular characteristic. The thread restricts its own processing of work items by intermittently evaluating workflow conditions for the plurality of threads; if the workflow conditions improve or are unimpaired, then the thread does not process any work items.
    Type: Application
    Filed: April 18, 2008
    Publication date: August 7, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark Joseph Cavage, Kristin M. Hazlewood, Richard Allyn Heller, Gary Dale Williams
  • Patent number: 7386848
    Abstract: A method is presented for processing data in a multithreaded application to alleviate impaired or substandard performance conditions. Work items that are pending processing by the multithreaded application are placed into a data structure. The work items are processed by a plurality of threads within the multithreaded application in accordance with a first algorithm, e.g., first-in first-out (FIFO). A thread within the multithreaded application is configured apart from the plurality of threads such that it processes work items in accordance with a second algorithm that differs from the first algorithm, thereby avoiding the impairing condition. For example, the thread may process a pending work item only if it has a particular characteristic. The thread restricts its own processing of work items by intermittently evaluating workflow conditions for the plurality of threads; if the workflow conditions improve or are unimpaired, then the thread does not process any work items.
    Type: Grant
    Filed: October 2, 2003
    Date of Patent: June 10, 2008
    Assignee: International Business Machines Corporation
    Inventors: Mark Joseph Cavage, Kristin M. Hazlewood, Richard Allyn Heller, Gary Dale Williams
  • Publication number: 20040117350
    Abstract: An apparatus and method for optimizing the schema definitions of an LDAP directory. With the apparatus and method, a required object class file is generated that sets forth the object classes required by a client device's applications. This file is then compared against the schema definitions in an LDAP directory server. Those schema definitions that reference the object classes in the required object class file are logged along with any superior classes of these object classes. Similarly, the attributes of these schema definitions and their superior attributes are also logged. The logged schema definitions and attributes are then stored as a reduced set of schema definitions in associated with a client device identifier. Thereafter, when the client device requests an LDAP directory operation, the reduced set of schema definitions is loaded and used rather than the entire set of LDAP directory schema definitions.
    Type: Application
    Filed: December 12, 2002
    Publication date: June 17, 2004
    Applicant: International Business Machines Corporation
    Inventors: Mark Joseph Cavage, Gary Dale Williams