Patents by Inventor John T. Kohl
John T. Kohl has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11070650Abstract: A method, computer program product, and a computing system are provided for de-duplicating remote procedure calls at a client. In an implementation, the method may include generating a plurality of local pending remote procedure calls. The method may also include identifying a set of duplicate remote procedure calls among the plurality of remote procedure calls. The method may also include associating each remote procedure call within the set of duplicate remote procedure calls with one another. The method may also include executing a remote procedure call of the set of duplicate remote procedure calls. The method may further include providing a response for the remote procedure call of the set of duplicate remote procedure calls with the other remote procedure calls of the set of duplicate remote procedure calls.Type: GrantFiled: March 4, 2020Date of Patent: July 20, 2021Assignee: International Business Machines CorporationInventors: John T. Kohl, Shailaja S. Golikeri
-
Patent number: 10929338Abstract: Managing access control lists (ACLs) across replicated data repositories can include selecting, from a first data processing system, a controlled object and an ACL object bound to the controlled object, wherein the first data processing system is associated with a first user identity space, and creating, using a processor, a replicated version of the controlled object within a second data processing system associated with a second user identity space, wherein the second user identity space is different from the first user identity space. Managing ACLs further includes, creating, using the processor, a replicated version of the ACL object within the second data processing system and substituting, within the replicated version of the ACL object, an identity from the first user identity space with a selected identity from the second user identity space.Type: GrantFiled: June 19, 2018Date of Patent: February 23, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John T. Kohl, Masabumi Koinuma, Margaret Marynowski, Huichung Wu, Mark S. Zukowsky
-
Publication number: 20200204650Abstract: A method, computer program product, and a computing system are provided for de-duplicating remote procedure calls at a client. In an implementation, the method may include generating a plurality of local pending remote procedure calls. The method may also include identifying a set of duplicate remote procedure calls among the plurality of remote procedure calls. The method may also include associating each remote procedure call within the set of duplicate remote procedure calls with one another. The method may also include executing a remote procedure call of the set of duplicate remote procedure calls. The method may further include providing a response for the remote procedure call of the set of duplicate remote procedure calls with the other remote procedure calls of the set of duplicate remote procedure calls.Type: ApplicationFiled: March 4, 2020Publication date: June 25, 2020Inventors: John T. Kohl, Shailaja S. Golikeri
-
Patent number: 10645194Abstract: A method, computer program product, and a computing system are provided for de-duplicating remote procedure calls at a client. In an implementation, the method may include generating a plurality of local pending remote procedure calls. The method may also include identifying a set of duplicate remote procedure calls among the plurality of remote procedure calls. The method may also include associating each remote procedure call within the set of duplicate remote procedure calls with one another. The method may also include executing a remote procedure call of the set of duplicate remote procedure calls. The method may further include providing a response for the remote procedure call of the set of duplicate remote procedure calls with the other remote procedure calls of the set of duplicate remote procedure calls.Type: GrantFiled: April 19, 2019Date of Patent: May 5, 2020Assignee: International Business Machines CorporationInventors: John T. Kohl, Shailaja S. Golikeri
-
Publication number: 20190253522Abstract: A method, computer program product, and a computing system are provided for de-duplicating remote procedure calls at a client. In an implementation, the method may include generating a plurality of local pending remote procedure calls. The method may also include identifying a set of duplicate remote procedure calls among the plurality of remote procedure calls. The method may also include associating each remote procedure call within the set of duplicate remote procedure calls with one another. The method may also include executing a remote procedure call of the set of duplicate remote procedure calls. The method may further include providing a response for the remote procedure call of the set of duplicate remote procedure calls with the other remote procedure calls of the set of duplicate remote procedure calls.Type: ApplicationFiled: April 19, 2019Publication date: August 15, 2019Inventors: John T. Kohl, Shailaja S. Golikeri
-
Patent number: 10382587Abstract: A method, computer program product, and a computing system are provided for de-duplicating remote procedure calls at a client. In an implementation, the method may include generating a plurality of local pending remote procedure calls. The method may also include identifying a set of duplicate remote procedure calls among the plurality of remote procedure calls. The method may also include associating each remote procedure call within the set of duplicate remote procedure calls with one another. The method may also include executing a remote procedure call of the set of duplicate remote procedure calls. The method may further include providing a response for the remote procedure call of the set of duplicate remote procedure calls with the other remote procedure calls of the set of duplicate remote procedure calls.Type: GrantFiled: June 26, 2015Date of Patent: August 13, 2019Assignee: International Business Machines CorporationInventors: John T. Kohl, Shailaja S. Golikeri
-
Publication number: 20180314692Abstract: Managing access control lists (ACLs) across replicated data repositories can include selecting, from a first data processing system, a controlled object and an ACL object bound to the controlled object, wherein the first data processing system is associated with a first user identity space, and creating, using a processor, a replicated version of the controlled object within a second data processing system associated with a second user identity space, wherein the second user identity space is different from the first user identity space. Managing ACLs further includes, creating, using the processor, a replicated version of the ACL object within the second data processing system and substituting, within the replicated version of the ACL object, an identity from the first user identity space with a selected identity from the second user identity space.Type: ApplicationFiled: June 19, 2018Publication date: November 1, 2018Inventors: John T. Kohl, Masabumi Koinuma, Margaret Marynowski, Huichung Wu, Mark S. Zukowsky
-
Patent number: 10102204Abstract: Managing access control lists (ACLs) across replicated data repositories can include selecting, from a first data processing system, a controlled object and an ACL object bound to the controlled object, wherein the first data processing system is associated with a first user identity space, and creating, using a processor, a replicated version of the controlled object within a second data processing system associated with a second user identity space, wherein the second user identity space is different from the first user identity space. Managing ACLs further includes, creating, using the processor, a replicated version of the ACL object within the second data processing system and substituting, within the replicated version of the ACL object, an identity from the first user identity space with a selected identity from the second user identity space.Type: GrantFiled: November 20, 2012Date of Patent: October 16, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John T. Kohl, Masabumi Koinuma, Margaret Marynowski, Huichung Wu, Mark S. Zukowsky
-
Patent number: 10055407Abstract: Managing access control lists (ACLs) across replicated data repositories can include selecting, from a first data processing system, a controlled object and an ACL object bound to the controlled object, wherein the first data processing system is associated with a first user identity space, and creating, using a processor, a replicated version of the controlled object within a second data processing system associated with a second user identity space, wherein the second user identity space is different from the first user identity space. Managing ACLs further includes, creating, using the processor, a replicated version of the ACL object within the second data processing system and substituting, within the replicated version of the ACL object, an identity from the first user identity space with a selected identity from the second user identity space.Type: GrantFiled: November 20, 2012Date of Patent: August 21, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John T. Kohl, Masabumi Koinuma, Margaret Marynowski, Huichung Wu, Mark S. Zukowsky
-
Publication number: 20160381182Abstract: A method, computer program product, and a computing system are provided for de-duplicating remote procedure calls at a client. In an implementation, the method may include generating a plurality of local pending remote procedure calls. The method may also include identifying a set of duplicate remote procedure calls among the plurality of remote procedure calls. The method may also include associating each remote procedure call within the set of duplicate remote procedure calls with one another. The method may also include executing a remote procedure call of the set of duplicate remote procedure calls. The method may further include providing a response for the remote procedure call of the set of duplicate remote procedure calls with the other remote procedure calls of the set of duplicate remote procedure calls.Type: ApplicationFiled: June 26, 2015Publication date: December 29, 2016Inventors: John T. Kohl, Shailaja S. Golikeri
-
Publication number: 20160007052Abstract: A server for live stream broadcasting of video comprises a network interface for receiving the video stream of a live event substantially simultaneously with the recording of the video stream to a server; and a processor for converting the video stream into a plurality of multicast video streams, each suitable for viewing by one of a plurality of computing devices.Type: ApplicationFiled: July 1, 2015Publication date: January 7, 2016Inventors: Stacy A. Haitsuka, John T. Kohl, Ofek Hayon, Christopher H. Murray
-
Patent number: 7860908Abstract: In a subject filesystem, the invention computer method use the filesystem's dentry trees for all file system objects not contained in a corresponding stacking filesystem. The invention method set the process environment to have a reliable inheritance of the stacking filesystem's root context to new processes and uses the subject filesystem's (VFSMNT, dentry) for most lookups. All lookup results are then with respect to the subject filesystem's roots.Type: GrantFiled: October 20, 2005Date of Patent: December 28, 2010Assignee: International Business Machines CorporationInventor: John T. Kohl
-
Publication number: 20070198540Abstract: A system and method are provided for mitigating propagation of select mounts in a shared mount tree. One or more mounts in the mount tree may be designated as non-bindable. Each non-bindable mount cannot be mirrored to a mount point through a mirror operation of a mount subtree in which the non-bindable mount resides. Similarly, each non-bindable mount prevents a submount residing on the non-bindable mount to be mirrored. However, the non-bindable mount and it's submounts may be mirrored when the entire mount tree is mirrored and attached to a mount point that resides in a no mount tree that acts as a pivot for a new mount tree created through a mirror operation. A mirror of the non-bindable mount maintains the properties of the non-bindable mount.Type: ApplicationFiled: February 1, 2006Publication date: August 23, 2007Inventors: John T. Kohl, Ramachandra N. Pai
-
Publication number: 20070100855Abstract: In a subject filesystem, the invention computer method and apparatus use the filesystem's dentry trees for all file system objects not contained in a corresponding stacking filesystem. The invention method and apparatus set the process environment to have a reliable inheritance of the stacking filesystem's root context to new processes and uses the subject filesystem's (VFSMNT, dentry) for most lookups. All lookup results are then with respect to the subject filesystem's roots.Type: ApplicationFiled: October 20, 2005Publication date: May 3, 2007Inventor: John T. Kohl