Patents by Inventor Ian Whalley

Ian Whalley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070294386
    Abstract: A method, computer program product, and data processing system for providing an improved directory service for storing information about hardware and software components is disclosed. The directory service stores not only the information that other hardware and software components require to locate, and make use of, the components listed in the directory, but is also able to dynamically construct ‘meta services’ that fulfill a client's functionality requirements.
    Type: Application
    Filed: August 27, 2007
    Publication date: December 20, 2007
    Inventors: Rajarshi Das, Ian Whalley
  • Publication number: 20070245004
    Abstract: Methods and systems are provided for autonomic control and optimization of computing systems. A plurality of component models for one or more components in an autonomic computing system are maintained in a system level database. These component models are obtained from a source external to the management server including the components associated with the models. Component models are added or removed from the database or updated as need. A system level management server in communication with the database utilizes the component models maintained in the system level database and generic component models as needed to compute an optimum state of the autonomic computing system. The autonomic computing system is managed in accordance with the computed optimum state.
    Type: Application
    Filed: April 18, 2006
    Publication date: October 18, 2007
    Inventors: David Chess, Rajashi Das, James Hanson, Alla Segal, Gerald Tesauro, Ian Whalley
  • Publication number: 20070220137
    Abstract: A system, computer program and method for inspection of a system under inspection. The system may include an inspection program configured to access information available at the system under inspection and generate inspection data for the system under inspection. A runtime platform independent from the inspection program at the system under inspection is configured to limit the limit the contents of the inspection data to a maximum information content. A trusted third-party computer system may assist in selecting the inspection program and transferring the resulting inspection data.
    Type: Application
    Filed: March 17, 2006
    Publication date: September 20, 2007
    Inventors: David Chess, Sophia Krasikov, David Levine, John Morar, Edward Pring, Alla Segal, Ian Whalley
  • Publication number: 20070185927
    Abstract: Users create, share, and build collaboration communities around tailored versions of the functional pages of a web site, such as the pages used to select and purchase products, or the pages used to present course materials in an online-learning site. The tailored versions of the web site are stored at the common web site development web site or at another server side location. Users access the tailored versions to select a tailored version for their own use and/or modification.
    Type: Application
    Filed: January 27, 2006
    Publication date: August 9, 2007
    Inventors: David Chess, Alla Segal, Ian Whalley, Jian Yin
  • Publication number: 20070180130
    Abstract: One embodiment of the present method and apparatus for multi-protocol digital communications conducts a first portion of a communication between a first information processing device and a second information processing device in accordance with a first communication protocol. A second portion of the communication is conducted in accordance with at least a second communication protocol, where the second communication protocol is different from the first communication protocol. The communication may be divided into further portions, where each portion of the communication is conducted in accordance with a different communication protocol.
    Type: Application
    Filed: February 1, 2006
    Publication date: August 2, 2007
    Inventors: William Arnold, David Chess, James Hanson, Edward Snible, Ian Whalley
  • Publication number: 20070016824
    Abstract: Techniques for globally managing systems are provided. One or more measurable effects of at least one hypothetical action to achieve a management goal are determined at a first system manager. The one or more measurable effects are sent from the first system manager to a second system manager. At the second system manager, one or more procedural actions to achieve the management goal are determined in response to the one or more received measurable effects. The one or more procedural actions are executed to achieve the management goal.
    Type: Application
    Filed: July 14, 2006
    Publication date: January 18, 2007
    Applicant: International Business Machines Corporation
    Inventors: John Bivens, David Chess, Donna Dillenberger, Steven Froehlich, James Hanson, Mark Hulber, Jeffrey Kephart, Giovanni Pacifici, Michael Spreitzer, Asser Tantawi, Mathew Thoennes, Ian Whalley, Peter Yocom
  • Publication number: 20060288412
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Application
    Filed: September 1, 2006
    Publication date: December 21, 2006
    Inventors: William Arnold, David Chess, John Morar, Alla Segal, Ian Whalley, Steve White
  • Publication number: 20060277591
    Abstract: A system and method are provided to establish trust between a user and a policy system that generates recommended actions in accordance with specified policies. Trust is introduced into the policy-based system by assigning a value to each execution of each policy with respect to the policy-based system, called the instantaneous trust index. The instantaneous trust indices for each one of the policies, for the each execution of a given policy or for both are combined into the overall trust index for a given policy or for a given policy-based system. The recommended actions are processed in accordance with the level or trust associated with a given policy as expressed by the trust indices. Manual user input is provided to monitor or change the recommended actions. In addition, reinforcement learning algorithms are used to further enhance the level of trust between the user and the policy-based system.
    Type: Application
    Filed: June 6, 2005
    Publication date: December 7, 2006
    Inventors: William Arnold, Hoi Chan, Alla Segal, Ian Whalley
  • Publication number: 20060167624
    Abstract: A system and method automatically maps computer center rooms and locates data center components within computer centers. Radio triangulation is used to determine the locations and, optionally, orientation, of machines within a computer center.
    Type: Application
    Filed: November 23, 2004
    Publication date: July 27, 2006
    Inventors: Ian Whalley, Steve White
  • Publication number: 20060112286
    Abstract: Applications and other server resources in a computer center are dynamically reprovisioned in response to power consumption and heat dissipation loads. Power consumption and temperature of each of a plurality of data center components which comprise the computer center are monitored. Based on the monitored power consumption and temperature, one or more applications from one or more data center components are relocated to other data center components of the computer center as needed to change power consumption and heat dissipation loads within the computer center. Also, based on the monitored power consumption and temperature, one or more applications running on one or more data center components of the computer center may be rescheduled as needed to change power consumption and heat dissipation loads within the computer center. Cooling devices within the computer center may also be controlled as needed to change heat dissipation loads within the computer center.
    Type: Application
    Filed: November 23, 2004
    Publication date: May 25, 2006
    Inventors: Ian Whalley, Steve White
  • Publication number: 20050283484
    Abstract: A method, apparatus, and computer instructions for providing identification and monitoring of entities. A distributed data processing system includes one or more distributed publishing entities, which publish computer readable announcements in a standard language. These announcements may contain a description of a monitoring method that may be used to monitor the behavior of one or more distributed monitored entities. These announcements also may include information used to identify a monitoring method that may be used by the distributed monitored entity to monitor its own behavior or by a distributed consumer entity to monitor the behavior of the distributed monitored entity. The monitoring also may be performed by a third-party distributed monitoring entity.
    Type: Application
    Filed: June 28, 2005
    Publication date: December 22, 2005
    Inventors: David Chess, Edward Snible, Ian Whalley
  • Publication number: 20050198243
    Abstract: A physical token is provided that is used to assign an activity or role to a specific device by virtue of a physical relationship with the device. By associating the token with a device, through electrical connection or by mere proximity relative to the device, an administrator informs the device of the intended role for the device in an enterprise. In conjunction with some bootstrapping or other appropriate software on the computing device, the act of placing the token in the proper physical relationship with the device is all that is necessary to configure and deploy the device in a data center. A device may be assigned roles from a plurality of tokens. Computing devices may also be assigned roles based upon their proximity to other devices. Roles may also include a concept of seniority, wherein one device may be assigned a more senior role to another device.
    Type: Application
    Filed: February 10, 2004
    Publication date: September 8, 2005
    Applicant: International Business Machines Corporation
    Inventors: Edward Snible, David Chess, Ian Whalley
  • Publication number: 20050198530
    Abstract: Methods and apparatus for automated adaptive reprovisioning of servers under security assault. The method comprises detecting a security assault or a possible security assault on a first server, and reprovisioning by automatically creating a new server instance with a desired new server configuration to perform at least one of the tasks performed by said server.
    Type: Application
    Filed: December 12, 2003
    Publication date: September 8, 2005
    Inventors: David Chess, Prashant Pandey, Ian Whalley, Steve White
  • Publication number: 20050125520
    Abstract: In one aspect this invention provides a data processing system (10) that includes a plurality of self-organizing software agents (40) capable of autonomously establishing relationships between themselves, where the totality of the relationships can be represented by a topological structure having nodes that each contain one of the plurality of software agents and links between the nodes that are the established relationships. The data processing system further includes a topology tuning function that obtains information that is descriptive of the topology and, based at least in part on the obtained information and on at least one criterion, that makes a recommendation to at least one of the plurality of software agents that is intended to modify the topology.
    Type: Application
    Filed: December 3, 2003
    Publication date: June 9, 2005
    Inventors: James Hanson, Ian Whalley
  • Publication number: 20050114847
    Abstract: Disclosed is a method, a system and a computer program that is stored on a computer-readable medium and that contains computer program instructions. The computer program instructions direct a computer to monitor the operation of at least one data transformation tool and to automatically record information, from data set manipulation behavior of the at least one data transformation tool, that is descriptive of dependencies inherent in data sets being manipulated. The recorded information is used during subsequent operation of the data transformation tool so as to avoid manipulating a particular data set that the recorded information indicates, in conjunction with other information, would not have changed since it was created or last modified. The other information may comprise at least data and time information that reflects when that the data set was created or last modified.
    Type: Application
    Filed: November 25, 2003
    Publication date: May 26, 2005
    Inventor: Ian Whalley
  • Publication number: 20050114532
    Abstract: In one aspect this invention provides a computer program embodied on a computer readable medium that is executed by at least one data processor of a policy management system. The computer program includes first computer program instructions for implementing a user interface and second computer program instructions for implementing a policy manager that is coupled to the user interface via a policy repository for introducing a new attribute, using the first computer program instructions, into a policy for a policy-managed system, without requiring a change to (e.g., without having to re-write or re-compile) the second computer program instructions.
    Type: Application
    Filed: November 21, 2003
    Publication date: May 26, 2005
    Inventors: David Chess, Murthy Devarakonda, Alla Segal, Ian Whalley
  • Patent number: 6328596
    Abstract: An improved plug and cable combination for connecting information appliances to an information socket and to a power socket, comprising a power conductor for transferring power from the power socket to the information appliance. The power conductor having a power plug at a first end, the power plug adapted to connect to the power socket. An information conductor for transferring information from the information socket to the information appliance. The information conductor having an information plug at a first end, the information plug adapted to connect to the information socket. A second end of the power conductor and a second end of the information conductor terminate at the information appliance. The information plug and the power plug having a plug joining means disposed thereon, wherein the plug joining means being capable to integrate the information plug and the power plug into an integrated plug.
    Type: Grant
    Filed: April 6, 2000
    Date of Patent: December 11, 2001
    Assignee: International Business Machines Corporation
    Inventors: David Chess, Ian Whalley, Steve Weingart