Patents by Inventor Richard A. Welp
Richard A. Welp has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9158633Abstract: An incremental backup system that performs the following (not necessarily in the following order): (i) making a plurality of time-ordered journal entries; (ii) determining that a corruption condition exists; (iii) responsive to a corruption condition, constructing a first incremental mirror data set that reflects a backup data set and all journal entries up to a first corrupted journal entry which is the earliest in time journal entry, of the plurality of journal entries, that is a corrupted journal entry; (iv) responsive to a corruption condition, constructing a second incremental mirror data set that reflects the backup data set and all journal entries up to the first corrupted journal entry; and (v) checking for corruption in the first and second incremental mirror data sets to determine the latest uncorrupted version of the data set.Type: GrantFiled: December 24, 2013Date of Patent: October 13, 2015Assignee: International Business Machines CorporationInventors: Thomas W. Bish, Kenneth W. Boyd, Gregory E. McBride, Richard A. Welp
-
Publication number: 20150178171Abstract: An incremental backup system that performs the following (not necessarily in the following order): (i) making a plurality of time-ordered journal entries; (ii) determining that a corruption condition exists; (iii) responsive to a corruption condition, constructing a first incremental mirror data set that reflects a backup data set and all journal entries up to a first corrupted journal entry which is the earliest in time journal entry, of the plurality of journal entries, that is a corrupted journal entry; (iv) responsive to a corruption condition, constructing a second incremental mirror data set that reflects the backup data set and all journal entries up to the first corrupted journal entry; and (v) checking for corruption in the first and second incremental mirror data sets to determine the latest uncorrupted version of the data set.Type: ApplicationFiled: December 24, 2013Publication date: June 25, 2015Applicant: International Business Machines CorporationInventors: Thomas W. Bish, Kenneth W. Boyd, Gregory E. McBride, Richard A. Welp
-
Patent number: 9043878Abstract: Multi-tiered distributed security authentication and filtering. One embodiment comprises managing user access to one or more computing resources, by centrally maintaining user subscription information comprising user authentication information and system authorization information, and providing relevant subscription information from the user subscription information to one or more remote computing systems. Managing user access further includes, in a remote computing system, authenticating a user login to the remote computing system based on user authentication information from said relevant subscription information, and upon user authentication, selectively authorizing user access to computing resources of the remote computing system based on system authorization information from said relevant subscription information.Type: GrantFiled: March 6, 2012Date of Patent: May 26, 2015Assignee: International Business Machines CorporationInventors: Benjamin S. Terris, Richard A. Welp
-
Publication number: 20150120792Abstract: A mechanism is provided in a data processing system for managing filesystem inodes. The mechanism monitors inode consumption in a filesystem. The mechanism periodically determines a number of inodes to add to the filesystem based on the inode consumption and adds the number of inodes to the filesystem.Type: ApplicationFiled: October 25, 2013Publication date: April 30, 2015Applicant: International Business Machines CorporationInventors: Nikhil Khandelwal, Gregory E. McBride, Richard A. Welp
-
Patent number: 8863087Abstract: A computer identifies one or more program functions within program code of a computer program affected by a program code change. The computer identifies program function calls made by the one or more program functions to other program functions. The computer adds the one or more program functions and program function calls to a program code database. The computer generates a mapping of relationships between the program functions of the program code. The computer selects one or more test scripts based on the mapping of relationships.Type: GrantFiled: June 25, 2012Date of Patent: October 14, 2014Assignee: International Business Machines CorporationInventors: Matthew R. Braverman, David A. Brettell, Anthony J. Ciaravella, Chuong H. Tran, Richard A. Welp
-
Publication number: 20140189130Abstract: Provided are a computer program product, system, and method for modifying an assignment of nodes to roles in a computing environment. There are a plurality of resource thresholds for each of a plurality of roles, wherein each role defines a type of operations and node resource usage for the nodes, and a measurement of node resource usage for the nodes. For at least one of the node, operations are performed comprising: determining at least one of the roles assigned to the node; determining a role resource threshold for each role assigned to the node; determining whether the measured node resource usage at the node exceeds the determined role resource thresholds for each role assigned to the node, wherein the role having the determined resource threshold exceeded by the node resource usage comprises a role to adjust; and determining a modification of the assignment of nodes to the role to adjust.Type: ApplicationFiled: November 7, 2013Publication date: July 3, 2014Applicant: International Business Machines CorporationInventors: Nikhil Khandelwal, Benjamin S. Terris, Richard A. Welp
-
Publication number: 20140189085Abstract: Provided are a computer program product, system, and method for modifying an assignment of nodes to roles in a computing environment. There are a plurality of resource thresholds for each of a plurality of roles, wherein each role defines a type of operations and node resource usage for the nodes, and a measurement of node resource usage for the nodes. For at least one of the node, operations are performed comprising: determining at least one of the roles assigned to the node; determining a role resource threshold for each role assigned to the node; determining whether the measured node resource usage at the node exceeds the determined role resource thresholds for each role assigned to the node, wherein the role having the determined resource threshold exceeded by the node resource usage comprises a role to adjust; and determining a modification of the assignment of nodes to the role to adjust.Type: ApplicationFiled: January 2, 2013Publication date: July 3, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nikhil Khandelwal, Benjamin S. Terris, Richard A. Welp
-
Patent number: 8694835Abstract: An apparatus for health monitoring includes a settings module, a field data module, a settings update module, and a monitoring module. The settings module is configured to store health monitoring settings for a plurality of monitored subsystems. The field data module is configured to receive field data, the field data comprising failure data of one or more systems of the same type as at least one of the monitored subsystems. The settings update module is configured to update the health monitoring settings stored by the settings module, wherein the health monitoring settings are updated based at least in part on the field data. The monitoring module is configured to perform one or more health monitoring tasks according to the health monitoring settings.Type: GrantFiled: September 21, 2011Date of Patent: April 8, 2014Assignee: International Business Machines CorporationInventors: Benjamin S. Terris, Richard A. Welp
-
Patent number: 8675303Abstract: A method is provided to handle portable cassettes removeably disposed in a data storage library, wherein the method supplies a data storage library comprising a plurality of storage slots, and a plurality of portable cassettes removeably disposed a designated storage slot in a first alignment order, and a pass-through accessor comprising a moveable fixturing apparatus to store portable cassettes, wherein the pass-through accessor is moveably disposed in the data storage library. The method positions the pass-through accessor adjacent an open end of a designated storage slot, and sequentially removes and attaches to the fixturing apparatus a plurality of portable cassettes from the designated storage slot. The method then transports the plurality of portable cassettes to a designated location within the data storage library.Type: GrantFiled: August 20, 2012Date of Patent: March 18, 2014Assignee: International Business Machines CorporationInventors: Matthew C. Compton, Louis D. Echevarria, Stefan Lehmann, Richard A. Welp
-
Publication number: 20130346947Abstract: A computer identifies one or more program functions within program code of a computer program affected by a program code change. The computer identifies program function calls made by the one or more program functions to other program functions. The computer adds the one or more program functions and program function calls to a program code database. The computer generates a mapping of relationships between the program functions of the program code. The computer selects one or more test scripts based on the mapping of relationships.Type: ApplicationFiled: June 25, 2012Publication date: December 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Matthew R. Braverman, David A. Brettell, Anthony J. Ciaravella, Chuong H. Tran, Richard A. Welp
-
Patent number: 8539285Abstract: According to one embodiment, a method for handling errors includes detecting that an error has occurred in a machine in a system, determining an error ID associated with the error, determining that the error should be reported to a host system for further analysis based on the error ID, determining that one or more actions should be taken by the system based on the error ID, and sending information corresponding to the error to the host system after it is determined that the error should be reported to the host system. In another embodiment, a system includes a processor and logic for performing the method. According to another embodiment, a computer program product includes a computer readable storage medium having computer readable code embodied therewith for performing the method. Other methods, systems, and computer program products are also described according to more embodiments.Type: GrantFiled: June 22, 2010Date of Patent: September 17, 2013Assignee: International Business Machines CorporationInventors: Thomas H. Daily, Nikhil Khandelwal, Stefan Lehmann, Jason A. Ogroski, Ricardo S. Padilla, Kerri R. Shotwell, Benjamin S. Terris, Steve P. Wallace, Richard A. Welp
-
Publication number: 20130239176Abstract: Multi-tiered distributed security authentication and filtering. One embodiment comprises managing user access to one or more computing resources, by centrally maintaining user subscription information comprising user authentication information and system authorization information, and providing relevant subscription information from the user subscription information to one or more remote computing systems. Managing user access further includes, in a remote computing system, authenticating a user login to the remote computing system based on user authentication information from said relevant subscription information, and upon user authentication, selectively authorizing user access to computing resources of the remote computing system based on system authorization information from said relevant subscription information.Type: ApplicationFiled: March 6, 2012Publication date: September 12, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Benjamin S. Terris, Richard A. Welp
-
Patent number: 8483868Abstract: A method to audit portable cassettes removeably disposed in a data storage library comprising a plurality of storage slots, a plurality of portable cassettes removeably disposed in one or more of said plurality of storage slots, and a pass-through accessor comprising a moveable fixturing apparatus, wherein the pass-through accessor is moveably disposed in said data storage library. The method disposes the pass-through accessor adjacent a first one of said plurality of storage slots, removes a first portable cassette from the first storage slot, and attaches the first portable cassette to a first fixturing assembly disposed on the fixturing apparatus. The method then removes a second portable cassette from the first storage slot, and attaches the second portable cassette to a second fixturing assembly disposed on the fixturing apparatus.Type: GrantFiled: April 30, 2012Date of Patent: July 9, 2013Assignee: International Business Machines CorporationInventors: Matthew C. Compton, Louis D. Echevarria, Stefan Lehmann, Richard A. Welp
-
Publication number: 20130073911Abstract: An apparatus for health monitoring includes a settings module, a field data module, a settings update module, and a monitoring module. The settings module is configured to store health monitoring settings for a plurality of monitored subsystems. The field data module is configured to receive field data, the field data comprising failure data of one or more systems of the same type as at least one of the monitored subsystems. The settings update module is configured to update the health monitoring settings stored by the settings module, wherein the health monitoring settings are updated based at least in part on the field data. The monitoring module is configured to perform one or more health monitoring tasks according to the health monitoring settings.Type: ApplicationFiled: September 21, 2011Publication date: March 21, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Benjamin S. Terris, Richard A. Welp
-
Publication number: 20120209618Abstract: A method for providing technical support for a computing device is disclosed herein. In one embodiment, such a method includes detecting a problem associated with a computing device. The method then determines a support level assigned to the computing device. A set of problems is associated with the support level. If the problem belongs to the set of problems associated with the support level, the method automatically sends a message to a support provider so that the support provider can address the problem.Type: ApplicationFiled: April 25, 2012Publication date: August 16, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Matthew C. Compton, Nikhil Khandelwal, Michael R. Maletich, Richard A. Welp
-
Publication number: 20120095888Abstract: A method for providing technical support for a computing device is disclosed herein. In one embodiment, such a method includes detecting a problem associated with a computing device. The method then determines a support level assigned to the computing device. A set of problems is associated with the support level. If the problem belongs to the set of problems associated with the support level, the method automatically sends a message to a support provider so that the support provider can address the problem. A corresponding system and computer program product are also described herein.Type: ApplicationFiled: October 15, 2010Publication date: April 19, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Matthew C. Compton, Nikhil Khandelwal, Michael R. Maletich, Richard A. Welp
-
Publication number: 20120096279Abstract: A method to provide problem-based access to a computing device is disclosed herein. In one embodiment of the invention, such a method includes detecting a problem on a computing device. The method automatically generates a user account on the computing device in response to detecting the problem. The problem is then tied to the user account. A support provider is then notified of the problem and the user account associated with the problem. This user account may be assigned to a service technician to enable access to the computing device. The service technician may then log into the computing device using the user account and address the problem. A corresponding apparatus and computer program product are also disclosed herein.Type: ApplicationFiled: October 13, 2010Publication date: April 19, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robin D. Roberts, Benjamin S. Terris, Richard A. Welp
-
Publication number: 20110314339Abstract: According to one embodiment, a method for handling errors includes detecting that an error has occurred in a machine in a system, determining an error ID associated with the error, determining that the error should be reported to a host system for further analysis based on the error ID, determining that one or more actions should be taken by the system based on the error ID, and sending information corresponding to the error to the host system after it is determined that the error should be reported to the host system. In another embodiment, a system includes a processor and logic for performing the method. According to another embodiment, a computer program product includes a computer readable storage medium having computer readable code embodied therewith for performing the method. Other methods, systems, and computer program products are also described according to more embodiments.Type: ApplicationFiled: June 22, 2010Publication date: December 22, 2011Applicant: International Business Machines CorporationInventors: Thomas H. Daily, Nikhil Khandelwal, Stefan Lehmann, Jason A. Ogroski, Ricardo S. Padilla, Kerri R. Shotwell, Benjamin S. Terris, Steve P. Wallace, Richard A. Welp
-
Publication number: 20110276843Abstract: A method for intelligently reporting errors is disclosed herein. In one embodiment, such a method includes detecting an error and determining whether the error belongs to an error group. Such an error group may include errors that together are an indicator of a potentially more serious error or condition. The method may further determine whether all errors in the error group have occurred within a specified time period. If all errors in the error group have occurred within the specified time period, the method automatically sends a notification to an administrator or other hardware or software-based system so that the problem or error can be addressed. A corresponding apparatus and computer program product are also disclosed herein.Type: ApplicationFiled: May 5, 2010Publication date: November 10, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Louis D. Echevarria, Stefan Lehmann, Benjamin Terris, Richard A. Welp
-
Publication number: 20110271257Abstract: A method for managing defects in an integrated development environment is disclosed herein. In one embodiment, such a method includes identifying one or more files associated with a defect. These one or more files may then be linked to the defect using a tag or other suitable linking mechanism. Once the files are linked to the defect, the method may allow the defect to be selected from a defect list. The files associated with the defect are optionally displayed upon selecting the defect. The method further enables an action to be selected for one or more of the files associated with the defect in the defect list. The method then automatically performs the action on the one or more files. A corresponding apparatus and computer program product are also disclosed herein.Type: ApplicationFiled: April 29, 2010Publication date: November 3, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Benjamin Terris, Richard A. Welp