Patents by Inventor John J. Auvenshine
John J. Auvenshine has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11526633Abstract: A media exfiltration authorization system is provided. A computer device receives a request from an application on a remote device, wherein the request is to store data on an external storage device. The computing device validates that the application is running in protected space on the remote device and includes an established unique identifier. The computing device generates an encryption key for the external storage device based, at least in part, on the validating. The computing device sends the encryption key to the application with authorization for the application to reformat the external storage device, store the requested data on the external storage device, and encrypt the external storage device using the encryption key.Type: GrantFiled: August 27, 2020Date of Patent: December 13, 2022Assignee: Kyndryl, Inc.Inventors: John J. Auvenshine, Joseph Dawson Davis, III, Khwaja Jawahar Jahangir Shaik
-
Publication number: 20220067215Abstract: A media exfiltration authorization system is provided. A computer device receives a request from an application on a remote device, wherein the request is to store data on an external storage device. The computing device validates that the application is running in protected space on the remote device and includes an established unique identifier. The computing device generates an encryption key for the external storage device based, at least in part, on the validating. The computing device sends the encryption key to the application with authorization for the application to reformat the external storage device, store the requested data on the external storage device, and encrypt the external storage device using the encryption key.Type: ApplicationFiled: August 27, 2020Publication date: March 3, 2022Inventors: John J. Auvenshine, Joseph Dawson Davis, III, Khwaja Jawahar Jahangir Shaik
-
Patent number: 11189290Abstract: A method, system, and program product for selecting software is provided. The method includes retrieving audio data during a call with a subject matter expert (SME). The audio data is converted into a data training set and documents of the SME are converted into a document training set. Canonical documents generated by authors are analyzed and specified code is extracted from the text data training set and document training set. Attributes of individuals are detected. The attributes are compared with specified data and the canonical documents and it is determined that the individuals are requesting information associated with the text data. The information is provided to the individuals via the canonical documents or the documents of the SME and it is determined if a matched set of data exists between the attributes, the specified data, and the canonical documents. A digital action associated with results of the determination is executed.Type: GrantFiled: December 4, 2019Date of Patent: November 30, 2021Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Jason LaScola, Michael Flores, Marci Devorah Formato, Ramesh Babu Kothamasu, Vidula M Patel
-
Patent number: 11153291Abstract: A method for verifying that default passwords have been changed without causing a security lockout, is provided, including enabling user identifiers associated with a plurality of devices, prior to an initial security test, identifying, a default password for a user identifier of each device, attempting a login to each device using the default password for the user identifier of each device, wherein: in response to determining that the login is successful, raising an alert against the user identifier as a security concern and maintaining an enabled state of the user identifier, in response to determining that the login is unsuccessful, disabling the user identifier so that the user identifier is in a non-enabled state, until a security lockout interval elapses, and retrying the login only for each user identifier in an enabled state during one or more subsequent security tests initiated after a predetermined alert interval.Type: GrantFiled: September 12, 2019Date of Patent: October 19, 2021Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder
-
Publication number: 20210174808Abstract: A method, system, and program product for selecting software is provided. The method includes retrieving audio data during a call with a subject matter expert (SME). The audio data is converted into a data training set and documents of the SME are converted into a document training set. Canonical documents generated by authors are analyzed and specified code is extracted from the text data training set and document training set. Attributes of individuals are detected. The attributes are compared with specified data and the canonical documents and it is determined that the individuals are requesting information associated with the text data. The information is provided to the individuals via the canonical documents or the documents of the SME and it is determined if a matched set of data exists between the attributes, the specified data, and the canonical documents. A digital action associated with results of the determination is executed.Type: ApplicationFiled: December 4, 2019Publication date: June 10, 2021Inventors: John J. Auvenshine, Jason LaScola, Michael Flores, Marci Devorah Formato, Ramesh Babu Kothamasu, Vidula M Patel
-
Patent number: 10963179Abstract: A method to prevent the inadvertent removal of volumes on a storage system is disclosed. In one embodiment, such a method includes receiving a request to remove (e.g., delete, detach, unmask, etc.) a volume on a storage system. In response to receiving the request, the method initiates at least one process to monitor the volume for I/O activity over a specified period of time. In the event the at least one process does not detect I/O activity to the volume during the specified period of time, the method executes the request by removing the volume. In the event the at least one process detects I/O activity to the volume during the specified period of time, the method denies the request to remove the volume. A corresponding system and computer program product are also disclosed.Type: GrantFiled: January 29, 2019Date of Patent: March 30, 2021Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Dave Kodjo, Nicolas Andre Druet, Marcel Pop, Paul Cloutier
-
Patent number: 10949287Abstract: Disclosed is a computer-implemented method of finding, troubleshooting and auto-remediating problems in storage environments.Type: GrantFiled: September 19, 2018Date of Patent: March 16, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Donald Charles Laing, John J. Auvenshine, Michael L. Camarco, III, Dominic Thibodeau, Per Lutkemeyer
-
Patent number: 10936439Abstract: A method for distributing data among storage devices. The method comprising one or more processors receiving a first graph workload that executes within a networked computing environment. The method further includes identifying data from the first graph workload that is utilized during the execution of the first graph workload that includes a plurality of data packets. The method further includes creating a first graph workload model representative of the graph structure of the first graph workload and determining two or more partitions that are representative of a distribution of the identified data utilized by the first graph workload based, at least in part, on the first graph workload model. The method further includes allocating a plurality of network accessible storage devices among the two or more partitions and copying a first set of data packets of the plurality of data packets to a network accessible storage device.Type: GrantFiled: May 14, 2018Date of Patent: March 2, 2021Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Sunhwan Lee, James E. Olson, Mu Qiao, Ramani R. Routray, Stanley C. Wood
-
Patent number: 10929369Abstract: A method and associated systems for optimized orchestration of a data-migration project. A data-migration orchestration system represents a hierarchical organization of each dataset to be migrated as a tree, where each leaf node of the tree represents data to be migrated and where a path between the leaf node and the root node represents a hierarchical directory pathname of sensitive data represented by the leaf node. Each tree is assigned a sensitivity signature that is proportional to the relative sensitivity and access frequency of the dataset represented by that tree. The signatures are organized into clusters as a function of the distances between each signature, and each signature is associated with a soft migration cost specific to that signature's cluster. A soft cost for migrating an application that requires multiple datasets may be determined by adding the migration costs associated with each of the multiple datasets.Type: GrantFiled: June 18, 2019Date of Patent: February 23, 2021Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Bernhard J. Klingenberg, Sunhwan Lee, James E. Olson, Mu Qiao, Ramani R. Routray
-
Patent number: 10901841Abstract: A method and system for improving operation of a memory device is provided. The method includes detecting, via sensors, environmental factors affecting an operation of individual hardware storage devices within an array of hardware storage devices. The environmental factors are analyzed with respect to operational characteristics of the individual hardware storage devices and a resulting expected failure rate for the individual hardware storage devices is determined. Array parameters associated with a hardware configuration for the array of hardware storage devices with respect to each expected failure rate are determined and associated issues are detected. Reliability characteristics and associated risks of the array of hardware storage devices are determined and a functionality of the array of hardware storage devices is modified.Type: GrantFiled: February 27, 2019Date of Patent: January 26, 2021Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Perry J. Gallo, Bent B. Holst, Mikael Lindstrom
-
Patent number: 10891160Abstract: Systems and methods for resource provisioning are disclosed. A method includes: generating, by a computer device, a resource provisioning policy for a resource; receiving, by the computer device, a request for an allocation of the resource from an account; applying, by the computer device, the resource provisioning policy to the request based on receiving the request; automatically approving or denying, by the computer device, the request based on the applying the resource provisioning policy to the request; updating, by the computer device, the resource provisioning policy for the account based on the automatic approving or denying the request.Type: GrantFiled: April 30, 2019Date of Patent: January 12, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John J. Auvenshine, Ramani R. Routray, Stanley C. Wood
-
Publication number: 20200372114Abstract: Methods, systems, and computer program products for media language translation and synchronization are provided. Aspects include receiving, by a processor, audio data associated with a speaker, wherein the audio data is in a first language, determining speaker characteristics associated with the speaker from the audio data, converting the audio data to a source text in the first language, converting the source text to a target text, wherein the target text is in a second language, and generating an output audio in the second language for the target text based on the speaker characteristics.Type: ApplicationFiled: May 21, 2019Publication date: November 26, 2020Inventors: John J. Auvenshine, Anthony Ciaravella, John T. Olson, Richard A. Welp
-
Patent number: 10771369Abstract: A method for predicting a failure of a complex storage environment is provided. An earliest expected incident of resource exhaustion on a data path of interest is predicted. The method includes monitoring a current utilization of one or more resources over a data path of interest, and calculating a maximum utilization threshold for each resource, such that exceeding the maximum utilization threshold adversely impacts one or more performance measures. An expected performance threshold is created that is associated with an expected performance. A maximum values of resource usage over time is analyzed to predict when the expected performance will fall outside of an acceptable overall performance threshold for the data path of interest to determine an earliest expected incident of resource exhaustion.Type: GrantFiled: March 20, 2017Date of Patent: September 8, 2020Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Perry J. Gallo, Bent B. Holst, Mikael H. Lindstrom
-
Patent number: 10754551Abstract: A method and associated systems for a workload-aware thin-provisioning system that allocates physical storage to virtual resources from pools of physical storage volumes. The system receives constraints that limit the amount of storage that can be allocated from each pool and the total workload that can be directed to each pool. It also receives lists of previous workloads and allocations associated with each volume at specific times in the past. The system then predicts future workloads and allocation requirements for each volume by regressing linear equations derived from the received data. If the predicted values indicate that a pool will at a future time violate a received constraint, the system computes the minimum costs to move each volume of the offending pool to a less-burdened pool. It then selects the lowest-cost combination of volume and destination pool and then moves the selected volume to the selected pool.Type: GrantFiled: March 5, 2019Date of Patent: August 25, 2020Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Rakesh Jain, James E. Olson, Mu Qiao, Ramani R. Routray, Stanley C. Wood
-
Patent number: 10749748Abstract: A method and system. A health and compliance check report for a network including two or more devices is received. The report includes a list of health and compliance check findings at a particular time. Each finding indicates a determination of non-compliance of a subject device of the two or more devices with a predetermined requirement and includes a severity value associated with the determination of non-compliance of the subject device. For each finding in the report, a ranking value is determined based on the associated severity value and an importance value of one or more devices connected to the subject device.Type: GrantFiled: March 23, 2017Date of Patent: August 18, 2020Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder, Stanley C. Wood
-
Publication number: 20200241786Abstract: A method to prevent the inadvertent removal of volumes on a storage system is disclosed. In one embodiment, such a method includes receiving a request to remove (e.g., delete, detach, unmask, etc.) a volume on a storage system. In response to receiving the request, the method initiates at least one process to monitor the volume for I/O activity over a specified period of time. In the event the at least one process does not detect I/O activity to the volume during the specified period of time, the method executes the request by removing the volume. In the event the at least one process detects I/O activity to the volume during the specified period of time, the method denies the request to remove the volume. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: January 29, 2019Publication date: July 30, 2020Applicant: International Business Machines CorporationInventors: John J. Auvenshine, Dave Kodjo, Nicolas Andre Druet, Marcel Pop, Paul Cloutier
-
Dynamic policy prioritization and translation of business rules into actions against storage volumes
Patent number: 10691367Abstract: A computer-implemented method of information lifecycle management is disclosed. The computer-implemented method includes reading, by a data processing system of a storage environment, business rules and policies for managing data in storage volumes of the storage environment, the policies being based on the predetermined business rules, and analyzing, by the data processing system, available storage and capacity in the storage environment. The computer-implemented method further includes dynamically prioritizing, by the data processing system, the policies based, at least in part, on results of the analyzing, resulting in prioritized policies, cognitively translating, by the data processing system, one or more of the predetermined business rules into action(s) against one or more of the storage volumes based, at least in part, on the prioritized policies, and executing, by the data processing system, the action(s).Type: GrantFiled: October 30, 2018Date of Patent: June 23, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John J. Auvenshine, David Schustek, Tron H. Pryor, Luis Ignacio Callero, Laura Richardson, Robert Ong Sio, David Lutz, Dave Aime Desire Kodjo -
Patent number: 10671327Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.Type: GrantFiled: March 8, 2019Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Per Lutkemeyer, Laura Richardson, David Schustek
-
Patent number: 10656835Abstract: A method, computer system, and computer program product for determining whether data compression should be performed at a storage virtualization layer or a backend layer, within a storage area network, including assessing a volume of data to decide whether the volume of data should be compressed or is already compressed, and in response to deciding that the volume of data should be compressed: checking whether a restriction exists on the volume of data, and in response to deciding that the volume of data is already compressed: determining that the volume of data already compressed should be uncompressed based on at least one metric.Type: GrantFiled: May 3, 2018Date of Patent: May 19, 2020Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Laura Richardson, Dave Aime Desire Kodjo, Lisa M. Chavez
-
DYNAMIC POLICY PRIORITIZATION AND TRANSLATION OF BUSINESS RULES INTO ACTIONS AGAINST STORAGE VOLUMES
Publication number: 20200133559Abstract: A computer-implemented method of information lifecycle management is disclosed. The computer-implemented method includes reading, by a data processing system of a storage environment, business rules and policies for managing data in storage volumes of the storage environment, the policies being based on the predetermined business rules, and analyzing, by the data processing system, available storage and capacity in the storage environment. The computer-implemented method further includes dynamically prioritizing, by the data processing system, the policies based, at least in part, on results of the analyzing, resulting in prioritized policies, cognitively translating, by the data processing system, one or more of the predetermined business rules into action(s) against one or more of the storage volumes based, at least in part, on the prioritized policies, and executing, by the data processing system, the action(s).Type: ApplicationFiled: October 30, 2018Publication date: April 30, 2020Inventors: John J. AUVENSHINE, David SCHUSTEK, Tron H. PRYOR, Luis Ignacio CALLERO, Laura RICHARDSON, Robert Ong SIO, David LUTZ, Dave Aime Desire KODJO