Patents by Inventor Jeffery J. Van Heuklon
Jeffery J. Van Heuklon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11983578Abstract: A computer program product may cause a processor to perform various operations in a composable computing system. The operations may include accessing a system resource database including, for each of a plurality of disaggregated computing hardware resources within the composable computing system, data corresponding to hardware characteristics for the hardware resource and a power domain characteristic of a power domain that supplies power to the hardware resource. The operations may further include identifying a workload request that requests performance of a workload and identifying a power domain requirement for the workload.Type: GrantFiled: March 31, 2021Date of Patent: May 14, 2024Inventors: James G. McLean, Fred A. Bower, III, Jeffery J. Van Heuklon
-
Publication number: 20240114054Abstract: A method includes establishing a WebSocket connection between an on-premises WebSocket application hosted on a first on-premises compute node and an off-premises WebSocket application hosted on a first off-premises compute node, wherein the first on-premises compute node is in an on-premises network having a firewall that prevents the first off-premises compute node from initiating a connection with the first on-premises compute node, and wherein the on-premises WebSocket application hosted on the first on-premises compute node initiates the establishing of the WebSocket connection with the off-premises WebSocket application hosted on the first off-premises compute node. The method further includes sending a message from a client application hosted on a second off-premises compute node to a server application hosted on a second on-premises compute node through the WebSocket connection, wherein the second off-premises compute node initiates the sending of the message to the second on-premises compute node.Type: ApplicationFiled: September 30, 2022Publication date: April 4, 2024Inventors: Alexandru Cozma, Jeffery J. Van Heuklon
-
Publication number: 20240114039Abstract: A method for detecting identity theft or identity change in managed computing systems is disclosed. An apparatus and computer program product also perform the functions of the method. The method includes identifying that a unique identifier of a first computing device assigned a first IP address matches a unique identifier of a second computing device assigned a second IP address and, in response to identifying that the unique identifier of the first computing device matches the unique identifier of the second computing device, sending a test message to the first computing device using the first IP address. The method includes sending an alert of a possible malicious event in response to receiving a response to the test message and sending an alert of a possible misconfiguration in response to a failure to receive a response to the test message.Type: ApplicationFiled: September 30, 2022Publication date: April 4, 2024Inventors: Alexandru Cozma, Jeffery J. Van Heuklon
-
Publication number: 20230308434Abstract: A method for creation of a secured connection for an inoperable virtual machine includes receiving a token at an on-host service running on an inoperable virtual machine (“VM”) on a server. The token is generated by a remote service person. The method includes receiving a user generated password from a user having direct access to the on-host service. The method includes creating a secured connection, using the token and password, between the on-host service and a remote server of the service person. The method includes transmitting a VM identifier of the inoperable VM to the user and receiving communications from the remote server. The communications include commands for the inoperable VM. The service person accesses the on-host service and inoperable VM using the VM identifier and the password. The password and VM identifier are transmitted to the service person by the user via a channel separate from the secured connection.Type: ApplicationFiled: March 28, 2022Publication date: September 28, 2023Inventors: Alexandru Cozma, Jeffery J. Van Heuklon, Ioana Voicu, Ionut Dobre
-
Publication number: 20230237547Abstract: A method for collecting metering data of on-premises computing resources without a network connection includes generating a unique signature at an off-premises server with a billing system configured to process metering data for a remote server at an on-premises site and to generate a bill based on the metering data. The off-premises server is not connected via a data network to an on-premises site with the remote server. The method includes inputting the unique signature at the on-premises site, encrypting the metering data of the remote server using the unique signature, downloading the encrypted metering data to a portable storage device at the on-premises site, and decrypting, by the off-premises server, the encrypted metering data using the unique signature. The portable storage device is disconnected from a server at the on-premises site when connected to the off-premises server. The method includes uploading the metering data using the off-premises server.Type: ApplicationFiled: January 24, 2022Publication date: July 27, 2023Inventors: Prashant Bhosale, Eric R. Kern, Robert Furda, Jeffery J. Van Heuklon
-
Patent number: 11650899Abstract: A method includes identifying maximum and minimum values in an input data set after a request to display data from the data set, which is remote and includes many entries with a first and a second value. First values are ordered sequentially and maximum and minimum values are second values. The method subtracts the minimum value from the maximum value to find a height, determines a target data amount for downloading to display to satisfy interface quality experience criteria, and calculates a difference level for a compression algorithm. The compression algorithm uses the difference level to select input data set entries for a compressed data set and is based on the input data set, the target data amount and the height. The method includes processing the input data set with the compression algorithm and the difference level to create the compressed data set, and transmitting the compressed data set.Type: GrantFiled: January 21, 2022Date of Patent: May 16, 2023Assignee: Lenovo Global Technology (United States) Inc.Inventors: Alexandru Cozma, Jeffery J. Van Heuklon, Ioana Voicu
-
Publication number: 20220318073Abstract: A computer program product may cause a processor to perform various operations in a composable computing system. The operations may include accessing a system resource database including, for each of a plurality of disaggregated computing hardware resources within the composable computing system, data corresponding to hardware characteristics for the hardware resource and a power domain characteristic of a power domain that supplies power to the hardware resource. The operations may further include identifying a workload request that requests performance of a workload and identifying a power domain requirement for the workload.Type: ApplicationFiled: March 31, 2021Publication date: October 6, 2022Inventors: James G. McLean, Fred A. Bower, III, Jeffery J. Van Heuklon
-
Publication number: 20220318433Abstract: A computer program product includes program instructions configured for execution by a processor to perform various operations. The operations include accessing a system resource database including, for each of a plurality of disaggregated computing hardware resources within a composable computing system, hardware characteristics that describe the disaggregated computing hardware resource, wherein the hardware characteristics include a physical location of the disaggregated computing hardware resource.Type: ApplicationFiled: March 31, 2021Publication date: October 6, 2022Inventors: James G. McLean, Fred A. Bower, III, Jeffery J. Van Heuklon
-
Publication number: 20200310838Abstract: Enhanced usability for product enhancement submissions may include identifying, in response to an indication to generate a product enhancement submission associated with a first user interface, one or more data values within the first user interface; replacing, in the first user interface, the one or more data values with one or more substitute values; generating an image of the first user interface comprising the one or more substitute values; and providing a second user interface facilitating generating the product enhancement submission, wherein the second user interface comprises the image of the first user interfaceType: ApplicationFiled: March 29, 2019Publication date: October 1, 2020Inventors: JEFFERY J. VAN HEUKLON, CHEKIM CHHOUR, RYAN P. RANDOLPH
-
Patent number: 10187320Abstract: Transferring workloads between computing devices in a distributed computing system, including: receiving, by a mobile computing device via a proximity-based communications protocol, a first computing device identity; receiving, by the mobile computing device, information describing one or more workloads executing on the first computing device; identifying, by the mobile computing device, a second computing device in the distributed computing system that is capable of executing at least a portion of the one or more workloads executing on the first computing device; and initiating, by the mobile computing device, a transfer of at least a portion of the one or more workloads executing on the first computing device to the second computing device.Type: GrantFiled: February 23, 2015Date of Patent: January 22, 2019Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.Inventors: Andrew T. Van Heuklon, Jeffery J. Van Heuklon
-
Publication number: 20160248696Abstract: Transferring workloads between computing devices in a distributed computing system, including: receiving, by a mobile computing device via a proximity-based communications protocol, a first computing device identity; receiving, by the mobile computing device, information describing one or more workloads executing on the first computing device; identifying, by the mobile computing device, a second computing device in the distributed computing system that is capable of executing at least a portion of the one or more workloads executing on the first computing device; and initiating, by the mobile computing device, a transfer of at least a portion of the one or more workloads executing on the first computing device to the second computing device.Type: ApplicationFiled: February 23, 2015Publication date: August 25, 2016Inventors: ANDREW T. VAN HEUKLON, JEFFERY J. VAN HEUKLON
-
Patent number: 9003223Abstract: Effects of a physical memory fault are mitigated. In one example, to facilitate mitigation, memory is allocated to processing entities of a computing environment, such as applications, operating systems, or virtual machines, in a manner that minimizes impact to the computing environment in the event of a memory failure. Allocation includes using memory structure information, including, information regarding fault containment zones, to allocate memory to the processing entities. By allocating memory based on fault containment zones, a fault only affects a minimum number of processing entities.Type: GrantFiled: September 27, 2012Date of Patent: April 7, 2015Assignee: International Business Machines CorporationInventors: Jerry D. Ackaret, Robert M. Dunn, Susan E. Goodwin, Sumeet Kochar, Randolph S. Kolvick, James A. O'Connor, Wilson E. Smith, Jeffery J. Van Heuklon
-
Patent number: 8954784Abstract: Embodiments include a power-efficient failover method. The method includes operating a primary server at a normal operating state in which program code is executed, and dynamically generating a backup of the results of the executed program code while in the normal operating state. The method further includes operating a redundant server at a reduced power state in which less power is consumed than in the normal operating state of the primary server. The workload of the primary server may be assumed according to the backup in response to a failure of the primary server. The power state of the redundant server is managed, including maintaining the redundant server in the reduced power state prior to detecting a failure of the primary server and increasing the power state of the redundant server and assuming the workload of the primary server in response to the failure of the primary server.Type: GrantFiled: July 3, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Fred A. Bower, III, Gregory B. Pruett, Cale T. Rath, Jeffery J. Van Heuklon
-
Patent number: 8694810Abstract: One embodiment provides a power management method for servers in a data center. A group of servers is selected, and the total power allocated to a group of servers is limited to within a group power budget. A separate server power allocation is individually requested for each of a plurality of the servers. Within the constraints of the group power budget, the requested server power allocations are selectively granted for a specified magnitude and duration. The granted server power allocations are also selectively renewed, either automatically or upon request of the servers. Each server that has not received a renewed server power allocation from a group power management entity upon the expiration of the specified duration automatically reduces its own power consumption, such as by the server powering itself off.Type: GrantFiled: September 22, 2010Date of Patent: April 8, 2014Assignee: International Business Machines CorporationInventors: Vikas Ahluwalia, Scott A. Piper, Jeffery J. Van Heuklon
-
Publication number: 20140089725Abstract: Effects of a physical memory fault are mitigated. In one example, to facilitate mitigation, memory is allocated to processing entities of a computing environment, such as applications, operating systems, or virtual machines, in a manner that minimizes impact to the computing environment in the event of a memory failure. Allocation includes using memory structure information, including, information regarding fault containment zones, to allocate memory to the processing entities. By allocating memory based on fault containment zones, a fault only affects a minimum number of processing entities.Type: ApplicationFiled: September 27, 2012Publication date: March 27, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jerry D. Ackaret, Robert M. Dunn, Susan E. Goodwin, Sumeet Kochar, Randolph S. Kolvick, James A. O'Connor, Wilson E. Smith, Jeffery J. Van Heuklon
-
Patent number: 8533230Abstract: A system for managing topologies includes a topology data datastore that stores topology information. A topology computer element interfaces with the topology data datastore to create and update a topology of resources. A subscription computer element generates notifications to a user based on at least one of the creating and the updating of the topology of resources and further based on subscription data.Type: GrantFiled: June 24, 2009Date of Patent: September 10, 2013Assignee: International Business Machines CorporationInventors: Jeremy R. Bauer, Boas Betzler, Jeffrey A. Frey, Jeffery J. Van Heuklon, Michael D. Williams
-
Patent number: 8407349Abstract: A computer-executable method for allocating resource discovery and identification processes among a plurality of management tools and resources in a distributed and heterogeneous IT management system includes providing at least one authoritative manageable resource having minimal or no responsibility for reporting its identity, minimal or no responsibility for advertising any lifecycle-related creation event for the resource, and minimal or no responsibility for advertising any lifecycle-related destruction event for the resource; using a service oriented architecture (SOA) to define one or more services needed to manage the resource within the management system; and using a component model to define one or more interfaces and one or more interactions to be implemented by the manageable resource within the management system.Type: GrantFiled: April 16, 2012Date of Patent: March 26, 2013Assignee: International Business Machines CorporationInventors: John E. Arwe, Jeffrey A. Frey, Jeffery J. Van Heuklon, Steve R. White, Michael D. Williams
-
Patent number: 8392567Abstract: Allocating resource discovery and identification processes among a plurality of management tools and resources in a distributed and heterogeneous information technology (IT) management system by providing at least one authoritative manageable resource having minimal or no responsibility for reporting its identity, minimal or no responsibility for advertising any lifecycle-related creation event for the resource, and minimal or no responsibility for advertising any lifecycle-related destruction event for the resource. A service oriented architecture (SOA) defines one or more services needed to manage the resource within the management system. A component model defines one or more interfaces and one or more interactions to be implemented by the manageable resource within the management system.Type: GrantFiled: March 16, 2009Date of Patent: March 5, 2013Assignee: International Business Machines CorporationInventors: John E. Arwe, Jeffrey A. Frey, Jeffery J. Van Heuklon, Steve R. White, Michael D. Williams
-
Publication number: 20120272094Abstract: Embodiments include a power-efficient failover method. The method includes operating a primary server at a normal operating state in which program code is executed, and dynamically generating a backup of the results of the executed program code while in the normal operating state. The method further includes operating a redundant server at a reduced power state in which less power is consumed than in the normal operating state of the primary server. The workload of the primary server may be assumed according to the backup in response to a failure of the primary server. The power state of the redundant server is managed, including maintaining the redundant server in the reduced power state prior to detecting a failure of the primary server and increasing the power state of the redundant server and assuming the workload of the primary server in response to the failure of the primary server.Type: ApplicationFiled: July 3, 2012Publication date: October 25, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Fred A. Bower, III, Gregory B. Pruett, Cale T. Rath, Jeffery J. van Heuklon
-
Publication number: 20120233330Abstract: A computer-executable method for allocating resource discovery and identification processes among a plurality of management tools and resources in a distributed and heterogeneous IT management system includes providing at least one authoritative manageable resource having minimal or no responsibility for reporting its identity, minimal or no responsibility for advertising any lifecycle-related creation event for the resource, and minimal or no responsibility for advertising any lifecycle-related destruction event for the resource; using a service oriented architecture (SOA) to define one or more services needed to manage the resource within the management system; and using a component model to define one or more interfaces and one or more interactions to be implemented by the manageable resource within the management system.Type: ApplicationFiled: April 16, 2012Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John E. Arwe, Jeffrey A. Frey, Jeffery J. Van Heuklon, Steve R. White, Michael D. Williams