Patents by Inventor Kevin L. Miner

Kevin L. Miner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240168667
    Abstract: An approach is disclosed that identifies an anomaly in a Volume Table of Contents Index (VTOC Index) that is associated with a Direct Access Storage Device (DASD) Volume Table of Contents (VTOC) that corresponds to a DASD. The approach operates to automatically correct the VTOC Index based on the identified anomaly.
    Type: Application
    Filed: November 22, 2022
    Publication date: May 23, 2024
    Inventors: Marc D Casad, Carrie J. da Silva, Michael Koester, Kevin L Miner
  • Patent number: 11860947
    Abstract: Provided are a computer program product, system, and method for deleted data restoration in accordance with one embodiment of the present description, in which in response to a search request having specified search parameters, data of a deleted data unit is located as a function of specified search parameters. In addition, metadata erased as a result of the deletion operation, is restored as a function of the located data. Accordingly, the previously deleted data unit is undeleted and access to the previously deleted data unit is restored via the restored metadata. Other aspects of deleted data restoration in accordance with the present description are described.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: January 2, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael J. Koester, Kevin L Miner, Raymond E. Garcia, Richard A. Schaeffer
  • Publication number: 20220350585
    Abstract: Provided are a computer program product, system, and method for applying a code update to a target system from a personal communication device. A code update command is received from a messaging application, executing on the personal communication device of the user, indicating a code update to install on the target system a code update maintained in the target system. The code update command is processed to extract indication of the code update to install and a target system user identifier of the target system on which to install the code update. At least one job is generated to install the code update on the target system. The at least one job is transmitted to the target system to cause the target system to process the at least one job to install the code update.
    Type: Application
    Filed: April 28, 2021
    Publication date: November 3, 2022
    Inventors: Michael KOESTER, Kevin L. MINER, Trinh NGUYEN, Camvu PHAM
  • Patent number: 11221768
    Abstract: A method for safely sharing access to a volume is disclosed. In one embodiment, such a method includes notifying a storage system that a volume on the storage system is in use by a first host system. The method stores, on the storage system, a first indicator indicating the volume is in use by the first host system. When the storage system receives an I/O request from a second host system to access data on the volume, the storage system reads the first indicator to determine that the volume is in use by the first host system. The storage system may then reject the I/O request from the second host system as a result of the first indicator. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: January 11, 2022
    Assignee: International Business Machines Corporation
    Inventors: Michael Koester, Kevin L. Miner, Jeanne Vangsness
  • Patent number: 11163587
    Abstract: A computer-implemented method according to one embodiment includes outputting an interface, receiving a first input and parsing contents of the first input. It is determined whether the first input includes the instances of information: a type of modification that is to be performed, a program that is to be incorporated in the performing of the modification, and a target system on which the modification is to be performed. In response to a determination that the first input does not include one or more of the instances of information, a request is output. In response to a determination that the first input includes the instances of information, a process is performed. The process includes correlating the instances of information to a script file and performing the modification in accordance with the instances of information of the first input. The process further includes collecting status information and outputting the status information.
    Type: Grant
    Filed: October 8, 2019
    Date of Patent: November 2, 2021
    Assignee: International Business Machines Corporation
    Inventors: Kevin L. Miner, Trinh Nguyen, Camvu Pham, Bard Allen Doster
  • Publication number: 20210103448
    Abstract: A computer-implemented method according to one embodiment includes outputting an interface, receiving a first input and parsing contents of the first input. It is determined whether the first input includes the instances of information: a type of modification that is to be performed, a program that is to be incorporated in the performing of the modification, and a target system on which the modification is to be performed. In response to a determination that the first input does not include one or more of the instances of information, a request is output. In response to a determination that the first input includes the instances of information, a process is performed. The process includes correlating the instances of information to a script file and performing the modification in accordance with the instances of information of the first input. The process further includes collecting status information and outputting the status information.
    Type: Application
    Filed: October 8, 2019
    Publication date: April 8, 2021
    Inventors: Kevin L. Miner, Trinh Nguyen, Camvu Pham, Bard Allen Doster
  • Patent number: 10936194
    Abstract: In one aspect of storage device status management in accordance with the present description, a host can determine not only whether a particular volume maintained by a storage unit controlled by a storage controller is on-line with respect to another host, but also whether that volume is actually in use by another host. Accordingly, should one host determine that a volume is in use by another host, the one host can defer its use of the volume until the volume is no longer in use by another host. In this manner, conflicts which may lead to loss of data integrity may be reduced or eliminated, providing a significant improvement in computer technology. Other features and aspects may be realized, depending upon the particular application.
    Type: Grant
    Filed: October 16, 2018
    Date of Patent: March 2, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael J. Koester, Kevin L. Miner, Thao Bui, Richard A. Schaeffer
  • Patent number: 10782893
    Abstract: A computer-implemented method according to one embodiment includes receiving a first command to inhibit one or more tracks within a volume of a storage system, in response to the first command, identifying the one or more tracks within the volume of the storage system, utilizing the first command or a previous command, and inhibiting the one or more tracks within the volume of the storage system, receiving a second command to copy data to the one or more tracks within the volume of the storage system, identifying the one or more tracks within the volume of the storage system as inhibited, and rejecting the second command, in response to the identifying.
    Type: Grant
    Filed: February 22, 2017
    Date of Patent: September 22, 2020
    Assignee: International Business Machines Corporation
    Inventors: Lisa J. Gundy, Michael J. Koester, Kevin L. Miner
  • Publication number: 20200250050
    Abstract: Provided are a computer program product, system, and method for deleted data restoration in accordance with one embodiment of the present description, in which in response to a search request having specified search parameters, data of a deleted data unit is located as a function of specified search parameters. In addition, metadata erased as a result of the deletion operation, is restored as a function of the located data. Accordingly, the previously deleted data unit is undeleted and access to the previously deleted data unit is restored via the restored metadata. Other aspects of deleted data restoration in accordance with the present description are described.
    Type: Application
    Filed: January 31, 2019
    Publication date: August 6, 2020
    Inventors: Michael J. Koester, Kevin L. Miner, Raymond E. Garcia, Richard A. Schaeffer
  • Patent number: 10691549
    Abstract: A storage controller receives a command to delete a dataset stored in a first set of storage volumes controlled by the storage controller. In response to receiving the command, a determination is made as to whether an indicator has been enabled to protect the dataset against an accidental deletion. In response to determining that the indicator has been enabled, the dataset is copied from the first set of storage volumes to a second set of storage volumes controlled by the storage controller. In response to completion of the copying of the dataset from the first set of storage volumes to the second set of storage volumes, the command to delete the dataset stored in the first set of storage volumes is executed.
    Type: Grant
    Filed: February 8, 2018
    Date of Patent: June 23, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael J. Koester, Kevin L. Miner, Trinh Nguyen, Steven Huntington
  • Publication number: 20200133516
    Abstract: A method for safely sharing access to a volume is disclosed. In one embodiment, such a method includes notifying a storage system that a volume on the storage system is in use by a first host system. The method stores, on the storage system, a first indicator indicating the volume is in use by the first host system. When the storage system receives an I/O request from a second host system to access data on the volume, the storage system reads the first indicator to determine that the volume is in use by the first host system. The storage system may then reject the I/O request from the second host system as a result of the first indicator. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: October 29, 2018
    Publication date: April 30, 2020
    Applicant: International Business Machines Corporation
    Inventors: Michael Koester, Kevin L. Miner, Jeanne Vangsness
  • Publication number: 20200117366
    Abstract: In one aspect of storage device status management in accordance with the present description, a host can determine not only whether a particular volume maintained by a storage unit controlled by a storage controller is on-line with respect to another host, but also whether that volume is actually in use by another host. Accordingly, should one host determine that a volume is in use by another host, the one host can defer its use of the volume until the volume is no longer in use by another host. In this manner, conflicts which may lead to loss of data integrity may be reduced or eliminated, providing a significant improvement in computer technology. Other features and aspects may be realized, depending upon the particular application.
    Type: Application
    Filed: October 16, 2018
    Publication date: April 16, 2020
    Inventors: Michael J. Koester, Kevin L. Miner, Thao Bui, Richard A. Schaeffer
  • Patent number: 10564874
    Abstract: A computer-implemented method according to one embodiment includes receiving a request to initialize a storage device, the request including a volume serial number associated with the storage device, identifying a size of the storage device, where the size is indicated within the request, determining a size of a table of contents and a location for the table of contents within the storage device, based on the identified size of the storage device, selecting a type of the table of contents from a plurality of different types, based on the identified size of the storage device, and automatically initializing the storage device, including creating the table of contents, reserving a physical area of the storage device for the table of contents using a physical extent, and inserting the table of contents into the storage device, where the table of contents has the determined size of the table of contents, the determined location for the table of contents, and the selected type of the table of contents.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: February 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael J. Koester, Kevin L. Miner, Trinh Huy Nguyen, Carrie J. Van Noorden
  • Publication number: 20190243716
    Abstract: A storage controller receives a command to delete a dataset stored in a first set of storage volumes controlled by the storage controller. In response to receiving the command, a determination is made as to whether an indicator has been enabled to protect the dataset against an accidental deletion. In response to determining that the indicator has been enabled, the dataset is copied from the first set of storage volumes to a second set of storage volumes controlled by the storage controller. In response to completion of the copying of the dataset from the first set of storage volumes to the second set of storage volumes, the command to delete the dataset stored in the first set of storage volumes is executed.
    Type: Application
    Filed: February 8, 2018
    Publication date: August 8, 2019
    Inventors: Michael J. KOESTER, Kevin L. MINER, Trinh NGUYEN, Steven HUNTINGTON
  • Patent number: 10216439
    Abstract: In one general embodiment, a computer-implemented method includes initializing a storage volume, receiving a request to secure unallocated data within the storage volume, sending a bit map to a hardware portion of the storage volume, in response to receiving the request, identifying unallocated data within the hardware portion of the storage volume utilizing the bit map, and marking the unallocated data as read inhibited within the hardware portion of the storage volume.
    Type: Grant
    Filed: February 2, 2016
    Date of Patent: February 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Branch, Harold S. Huber, Michael J. Koester, Kevin L. Miner
  • Publication number: 20180239544
    Abstract: A computer-implemented method according to one embodiment includes receiving a first command to inhibit one or more tracks within a volume of a storage system, in response to the first command, identifying the one or more tracks within the volume of the storage system, utilizing the first command or a previous command, and inhibiting the one or more tracks within the volume of the storage system, receiving a second command to copy data to the one or more tracks within the volume of the storage system, identifying the one or more tracks within the volume of the storage system as inhibited, and rejecting the second command, in response to the identifying.
    Type: Application
    Filed: February 22, 2017
    Publication date: August 23, 2018
    Inventors: Lisa J. Gundy, Michael J. Koester, Kevin L. Miner
  • Publication number: 20180232170
    Abstract: A computer-implemented method according to one embodiment includes receiving a request to initialize a storage device, the request including a volume serial number associated with the storage device, identifying a size of the storage device, where the size is indicated within the request, determining a size of a table of contents and a location for the table of contents within the storage device, based on the identified size of the storage device, selecting a type of the table of contents from a plurality of different types, based on the identified size of the storage device, and automatically initializing the storage device, including creating the table of contents, reserving a physical area of the storage device for the table of contents using a physical extent, and inserting the table of contents into the storage device, where the table of contents has the determined size of the table of contents, the determined location for the table of contents, and the selected type of the table of contents.
    Type: Application
    Filed: April 10, 2018
    Publication date: August 16, 2018
    Inventors: Michael J. Koester, Kevin L. Miner, Trinh Huy Nguyen, Carrie J. Van Noorden
  • Patent number: 10021148
    Abstract: In one embodiment, a computer-implemented method includes: receiving a request to establish a Peer-to-Peer Remote Copy (PPRC) relationship between a primary storage system and a secondary storage system; and copying one or more data tracks of a primary storage device in the primary storage system to the secondary storage system without copying at least one other data track of the primary storage device to the secondary storage system. The one or more data tracks of the primary storage device comprise one or more data tracks of a first characteristic. Other portions of the primary storage device comprise one or more other data tracks of a second characteristic. Tracks of the first characteristic may include valid data records, while tracks of the second characteristic may include invalid data records and/or empty tracks. Corresponding systems and computer program products are also disclosed.
    Type: Grant
    Filed: May 18, 2016
    Date of Patent: July 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Gavin S. Johnson, Michael J. Koester, Kevin L. Miner
  • Patent number: 9996294
    Abstract: A computer-implemented method according to one embodiment includes receiving a request to initialize a storage device, identifying a size of the storage device to be initialized, determining a size of a table of contents and a location for the table of contents within the storage device, based on the identified size of the storage device to be initialized, determining a type of the table of contents; and initializing the storage device, utilizing the determined size of the table of contents, the determined location for the table of contents, and the determined type of the table of contents.
    Type: Grant
    Filed: February 2, 2016
    Date of Patent: June 12, 2018
    Assignee: International Business Machines Corporation
    Inventors: Michael J. Koester, Kevin L. Miner, Trinh Huy Nguyen, Carrie J. Van Noorden
  • Publication number: 20170220288
    Abstract: A computer-implemented method according to one embodiment includes receiving a request to initialize a storage device, identifying a size of the storage device to be initialized, determining a size of a table of contents and a location for the table of contents within the storage device, based on the identified size of the storage device to be initialized, determining a type of the table of contents; and initializing the storage device, utilizing the determined size of the table of contents, the determined location for the table of contents, and the determined type of the table of contents.
    Type: Application
    Filed: February 2, 2016
    Publication date: August 3, 2017
    Inventors: Michael J. Koester, Kevin L. Miner, Trinh Huy Nguyen, Carrie J. Van Noorden