Patents by Inventor Kimberly T. Bailey
Kimberly T. Bailey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9632700Abstract: A method, system, and computer program product for managing a storage facility are disclosed. A potential file overlay may be detected when performing a file transfer. When a file is common to multiple systems and resides on a shared system storage volume, potential file corruption due to a data transfer request is detected and then able to be prevented. Hardware identifiers such as Universal Unique Identifiers (UUIDs) are used in managing a write of a file to shared system storage. By comparing multiple hardware identifiers, a determination is made as to whether to process the write of the file. If the hardware identifiers mismatch, the write is processed. If the hardware identifiers match, a potential file overlay is detected. Because of the potential file overlay, the write is aborted and a failure notification is returned. A successful overwrite prevention notification may also be returned.Type: GrantFiled: July 2, 2014Date of Patent: April 25, 2017Assignee: International Business Machines CorporationInventors: Kimberly T. Bailey, Samuel E. Reynolds, Wayne E. Rhoten, Andrew K. Tracy
-
Patent number: 9442746Abstract: A method for managing settings of applications. A request from an application to store runtime settings currently being used by the application is identified. In response to identifying the request, the runtime settings are then stored on in a repository of runtime settings. In one or more examples, the application is running on an operating system on a computer system, and the request is communicated through a common system service of the operating system.Type: GrantFiled: August 12, 2015Date of Patent: September 13, 2016Assignee: International Business Machines CorporationInventors: Kimberly T. Bailey, Thomas K. McCarthy, Michael W. Stayton
-
Patent number: 9389883Abstract: Managing settings of applications is provided. A request from an application to store runtime settings, currently being used by the application, is identified by a processor executing program instructions for managing settings of applications. In response to identifying the request, the runtime settings are then stored on in a repository of runtime settings. In one or more examples, the application is running on an operating system on a computer system, and the request is communicated through a common system service of the operating system.Type: GrantFiled: June 18, 2014Date of Patent: July 12, 2016Assignee: International Business Machines CorporationInventors: Kimberly T. Bailey, Thomas K. McCarthy, Michael W. Stayton
-
Patent number: 9253016Abstract: An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform.Type: GrantFiled: November 2, 2010Date of Patent: February 2, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ingo Adlung, Kimberly T. Bailey, Friedemann Baitinger, Patricia G. Driever, Jeffrey A. Frey, Lap T. Huynh, Constantinos Kassimis, Angelo Macchiano, Bruce Ratcliff, Jerry W. Stevens, Stephen R. Valley
-
Patent number: 9253017Abstract: An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform.Type: GrantFiled: December 17, 2012Date of Patent: February 2, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ingo Adlung, Kimberly T. Bailey, Friedemann Baitinger, Patricia G. Driever, Jeffrey A. Frey, Lap T. Huynh, Constantinos Kassimis, Angelo Macchiano, Bruce Ratcliff, Jerry W. Stevens, Stephen R. Valley
-
Publication number: 20160004442Abstract: A method, system, and computer program product for managing a storage facility is disclosed. The methodology detects a potential file overlay when performing a file transfer. When a file is common to multiple systems and resides on a shared system storage volume, potential file corruption due to a data transfer request is detected and then able to be prevented. Hardware identifiers such as Universal Unique Identifiers (UUIDs) are used in managing a write of a file to shared system storage. By comparing multiple hardware identifiers, a determination is made as to whether to process the write of the file. If the hardware identifiers mismatch, the write is processed. If the hardware identifiers match, a potential file overlay is detected. Because of the potential file overlay, the write is stopped or a failure notification is returned.Type: ApplicationFiled: July 2, 2014Publication date: January 7, 2016Inventors: Kimberly T. Bailey, Samuel E. Reynolds, Wayne E. Rhoten, Andrew K. Tracy
-
Publication number: 20150370598Abstract: Managing settings of applications is provided. A request from an application to store runtime settings, currently being used by the application, is identified by a processor executing program instructions for managing settings of applications. In response to identifying the request, the runtime settings are then stored on in a repository of runtime settings. In one or more examples, the application is running on an operating system on a computer system, and the request is communicated through a common system service of the operating system.Type: ApplicationFiled: June 18, 2014Publication date: December 24, 2015Inventors: Kimberly T. Bailey, Thomas K. McCarthy, Michael W. Stayton
-
Publication number: 20150370581Abstract: A method for managing settings of applications. A request from an application to store runtime settings currently being used by the application is identified. In response to identifying the request, the runtime settings are then stored on in a repository of runtime settings. In one or more examples, the application is running on an operating system on a computer system, and the request is communicated through a common system service of the operating system.Type: ApplicationFiled: August 12, 2015Publication date: December 24, 2015Inventors: Kimberly T. Bailey, Thomas K. McCarthy, Michael W. Stayton
-
Patent number: 8612602Abstract: A method automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The method automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.Type: GrantFiled: March 17, 2012Date of Patent: December 17, 2013Assignee: International Business Machines CorporationInventors: Kimberly T. Bailey, Jeffrey B. Cates, Diane I. Shannon, Mark T. Wright
-
Patent number: 8606925Abstract: A system automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The system automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.Type: GrantFiled: April 4, 2011Date of Patent: December 10, 2013Assignee: International Business Machines CorporationInventors: Kimberly T. Bailey, Jeffrey B. Cates, Diane I. Shannon, Mark T. Wright
-
Patent number: 8539548Abstract: A hierarchical administrative system centrally controls configuration of network security policy for a group of information handling systems (IHSs) by multiple tier levels of administration. The highest tier level of administration builds policies that fulfill IT security policy intent. Higher level administrators may scope subordinate administrators to a group of IHSs or a single IHS. Higher level administrators may allow subordinate administrators to perform system specific customization of the policy based on permissions that the higher level administrator grants. Customization may include completing partially-built rule conditions with IP address and port, completing partially-built rule actions, and adding or deleting rules based on IHS unique applications or security requirements. A security enforcement tool may enforce customizations of network security policy.Type: GrantFiled: April 27, 2012Date of Patent: September 17, 2013Assignee: International Business Machines CorporationInventors: Linwood H. Overby, Jr., Kimberly T. Bailey, Jeffrey B. Cates, Mark T. Wright
-
Patent number: 8521890Abstract: A Hardware Management Console (HMC) configures virtual networks. The HMC extends Internal Queued Direct I/O to an intra-ensemble data network (IEDN) within a cluster of virtual servers to define a single channel path identifier, and to define a channel parameter. The HMC defines at least one virtual network. The HMC defines a bridge port within each CPC that supports at least one of the virtual servers. The HMC defines a network interface for each virtual server within each cluster. The HMC grants access to a corresponding virtual network for each virtual server.Type: GrantFiled: June 7, 2011Date of Patent: August 27, 2013Assignee: International Business Machines CorporationInventors: Kimberly T. Bailey, Patricia G. Driever, Constantinos Kassimis, Angelo Macchiano, Sr., Gary O. McAfee, Jerry W. Stevens, Richard P. Tarcza, Alexandra Winter
-
Publication number: 20120317567Abstract: A Hardware Management Console (HMC) configures virtual networks. The HMC extends Internal Queued Direct I/O to an intra-ensemble data network (IEDN) within a cluster of virtual servers to define a single channel path identifier, and to define a channel parameter. The HMC defines at least one virtual network. The HMC defines a bridge port within each CPC that supports at least one of the virtual servers. The HMC defines a network interface for each virtual server within each cluster. The HMC grants access to a corresponding virtual network for each virtual server.Type: ApplicationFiled: June 7, 2011Publication date: December 13, 2012Applicant: International Business Machines CorporationInventors: Kimberly T. Bailey, Patricia G. Driever, Constantinos Kassimis, Angelo MacChiano, SR., Gary O. McAfee, Jerry W. Stevens, Richard P. Tarcza, Alexandra Winter
-
Publication number: 20120254438Abstract: A system automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The system automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.Type: ApplicationFiled: April 4, 2011Publication date: October 4, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kimberly T. Bailey, Jeffrey B. Cates, Diane I. Shannon, Mark T. Wright
-
Publication number: 20120254441Abstract: A method automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The method automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.Type: ApplicationFiled: March 17, 2012Publication date: October 4, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kimberly T. Bailey, Jeffrey B. Cates, Diane I. Shannon, Mark T. Wright
-
Publication number: 20120110155Abstract: An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform.Type: ApplicationFiled: November 2, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ingo Adlung, Kimberly T. Bailey, Friedemann Baitinger, Patricia G. Driever, Jeffrey A. Frey, Lap T. Huynh, Constantinos Kassimis, Angelo Macchiano, Bruce Ratcliff, Jerry W. Stevens, Stephen R. Valley