Patents by Inventor Steven J. Mastrianni

Steven J. Mastrianni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090307335
    Abstract: In a first aspect of the present invention, methods and apparatus implement graphical user interfaces for interactively specifying service level agreements used to regulate delivery of services to, for example, computer systems. An interactive graphical user interface allows a user to see the effects of varying values of service delivery variables on the level of service achievable in a particular service delivery context. In a second aspect, methods and apparatus of the present invention provision resources required for service delivery. In the second aspect, the methods and apparatus of the present invention select a service delivery model dependent on context. The selected service delivery model is used to provision resources that will be required during service delivery. In a third aspect, methods and apparatus of the present invention monitor compliance with a service level agreement during a service delivery event.
    Type: Application
    Filed: August 13, 2009
    Publication date: December 10, 2009
    Inventors: David F. Bantz, Thomas E. Chefalas, Peter W. Gayek, Walter C. Huber, Srikant Jalan, Patrik Lehrner, Steven J. Mastrianni, Marco Porak
  • Publication number: 20090307041
    Abstract: In a first aspect of the present invention, methods and apparatus implement graphical user interfaces for interactively specifying service level agreements used to regulate delivery of services to, for example, computer systems. An interactive graphical user interface allows a user to see the effects of varying values of service delivery variables on the level of service achievable in a particular service delivery context. In a second aspect, methods and apparatus of the present invention provision resources required for service delivery. In the second aspect, the methods and apparatus of the present invention select a service delivery model dependent on context. The selected service delivery model is used to provision resources that will be required during service delivery. In a third aspect, methods and apparatus of the present invention monitor compliance with a service level agreement during a service delivery event.
    Type: Application
    Filed: August 13, 2009
    Publication date: December 10, 2009
    Inventors: David F. Bantz, Thomas E. Chefalas, Peter W. Gayek, Walter C. Huber, Srikant Jalan, Patrik Lehrner, Steven J. Mastrianni, Marco Porak
  • Patent number: 7584266
    Abstract: A method, apparatus and computer product that, in a system having a client computer, and apparatus for connecting the client computer to a network having a server for backing up the client computer, enables transferring data from the client computer to the server, by connecting the client computer to the network; backing up data on the client computer to a storage device attached to the network when the client computer is connected to the network; and transferring the data from the storage device to the server, preferably at a time determined by the server.
    Type: Grant
    Filed: December 16, 2003
    Date of Patent: September 1, 2009
    Assignee: International Business Machines Corporation
    Inventors: Steven J. Mastrianni, James Rubas, Ajay Mohindra, Thomas F. Chefalas, Norbert G. Vogl
  • Publication number: 20090210885
    Abstract: A secure object manager obtains, from an authorized person, a specification for disposition of at least one object, and creates first instructions, pertaining to the disposition, for a remote secure-object agent on a remote system. A copy of the object and the first instructions are sent to a remote secure-object agent on a remote system, which controls the copy based on the first instructions.
    Type: Application
    Filed: February 14, 2008
    Publication date: August 20, 2009
    Applicant: International Business Machines Corporation
    Inventors: David F. Bantz, Ramon Caceres, Thomas E. Chefalas, Srikant Jalan, Steven J. Mastrianni, Clifford A. Pickover
  • Patent number: 7546639
    Abstract: The present invention provides techniques for protecting information in a computing device. For instance, a location of the computing device is detected. It is determined whether the location is an unauthorized location. Access to the information is restricted in response to the location being an unauthorized location. As another example, information in a computing device may be protected by detecting location of the computing device. It is determined whether the location is an unauthorized location. One or more decoy files are created in the information in response to the location being an unauthorized location.
    Type: Grant
    Filed: November 19, 2004
    Date of Patent: June 9, 2009
    Assignee: International Business Machines Corporation
    Inventors: David F Bantz, Thomas E Chefalas, Steven J Mastrianni, Clifford Alan Pickover
  • Patent number: 7506241
    Abstract: A method, apparatus, and computer instructions for managing a program. Operation of the program is monitored by an agent process. An observed operation of the program is compared with an expected operation of the program to form a comparison. A determination is made as to whether an error has occurred based on the comparison. In response to an occurrence of the error, a solution for the error is obtained and implemented by the agent process.
    Type: Grant
    Filed: October 16, 2003
    Date of Patent: March 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Thomas E. Chefalas, Steven J. Mastrianni
  • Patent number: 7493654
    Abstract: A computer system having at least one CPU has as its only interface with the Internet and other external sources a virtual machine that contains a browser and/or other communications programs, so that e-mail and other external communications are opened within the virtual machine and stored within a virtual storage. The virtual machine is erased at frequent intervals, taking with it any changes made by virus or other hostile programs.
    Type: Grant
    Filed: November 20, 2004
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: David F. Bantz, Thomas E. Chefalas, Steven J. Mastrianni, Clifford A. Pickover
  • Patent number: 7475135
    Abstract: A system accesses a log of events on more than one computing system and scans these logs in an effort to determine the likely cause of various items of interest, events, or problems. These items of interest often include improper or frustrating behavior of a computer system, but may also include delightful or beneficial behaviors for which a user, group of users, company, service, or help desk seeks a cause. Once the likely source of the item of interest is found, a test may be performed to confirm the source of the problem and warning or corrective action taken.
    Type: Grant
    Filed: March 31, 2005
    Date of Patent: January 6, 2009
    Assignee: International Business Machines Corporation
    Inventors: David F. Bantz, Thomas E. Chefalas, Steven J. Mastrianni, Clifford A. Pickover
  • Patent number: 7475425
    Abstract: The authenticity of a website is tested with software that runs on a personal computing device and a service that is provided via the Internet. The software on the personal computing device is in the form of a proxy, or transparent component in the Internet Protocol implementation. The proxy receives all outbound messages, analyzes them and forwards or modifies them without the user's intervention. The service tests the IP address and/or the behavior of the target website.
    Type: Grant
    Filed: October 4, 2007
    Date of Patent: January 6, 2009
    Assignee: International Business Machines Corporation
    Inventors: David F. Bantz, Thomas E. Chefalas, Steven J. Mastrianni
  • Publication number: 20080320135
    Abstract: A method, computer readable medium and computer system for repairing a failed network connection between a client system and a network is disclosed. In a first aspect, the method preferably includes collecting real time connectivity information by the client system and utilizing the real time connectivity information by the client system to establish a connection with the network. In a second aspect, a computer system coupled to a network includes at least one network adapter for monitoring and collecting real time connectivity information from the network, memory for storing the real time connectivity information, and a processor coupled to the memory and to the at least one network adapter, where the processor is configured to execute program instructions for utilizing the real time connectivity information to repair a failed network connection between the computer system and the network.
    Type: Application
    Filed: August 28, 2008
    Publication date: December 25, 2008
    Applicant: International Business Machines Corporation
    Inventors: David C. Challener, Steven J. Mastrianni, Joseph R. Parker, Ratan Ray, Leendert P. Van Doorn
  • Publication number: 20080235330
    Abstract: A signal bearing medium tangibly embodies a program of machine-readable instructions executable by a digital processing apparatus to perform operations comprising receiving an email message having an extended email address encoded virtual address, resolving said address to an actual email address, replacing the virtual address with the actual email address, and transmitting said email message.
    Type: Application
    Filed: June 5, 2008
    Publication date: September 25, 2008
    Inventors: Richard J. CARDONE, Steven J. Mastrianni, Alpana Tiwari
  • Publication number: 20080235806
    Abstract: The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.
    Type: Application
    Filed: June 2, 2008
    Publication date: September 25, 2008
    Inventors: David F. BANTZ, Thomas E. Chefalas, Steven J. Mastrianni, Clifford A. Pickover
  • Publication number: 20080235678
    Abstract: The present invention concerns methods and apparatus for controlling software patching activity in, for example, computer systems. Methods and apparatus of the present invention may implement a software shell and institute a patching policy to control patching activities. When implemented, the software shell acts as a barrier which permits patching of the underlying software only when the patching activity would be in accordance with the instituted patching policy. Various patching policies can be instituted in embodiments of the present invention. For example, patching may be done when convenient; or just before when software characteristics and/or behavior. In other circumstances, patching may be delayed until confidence has been established in a new patch so as to avoid disrupting a computer system that is already functioning in an acceptable manner.
    Type: Application
    Filed: June 5, 2008
    Publication date: September 25, 2008
    Inventors: David F. BANTZ, Thomas E. Chefalas, Steven J. Mastrianni, Clifford A. Pickover
  • Publication number: 20080229227
    Abstract: The present invention concerns methods and apparatus for managing multiple virtual machines simultaneously operative in a computing environment. The methods and apparatus of the present invention provide an integrated work environment—for example, a desktop—which incorporates graphical and control elements from multiple virtual machines. In embodiments of the present invention, application programs and resources available in multiple virtual machines can be accessed from a single desktop. Methods and apparatus of the present invention provide visual cues for associating control elements and resources with particular virtual machines. In embodiments of the present invention, multiple virtual machines operative in a computing environment can comprise a plurality of collaborative virtual machines, or a private virtual machine and one or more collaborative virtual machines.
    Type: Application
    Filed: June 3, 2008
    Publication date: September 18, 2008
    Inventors: David F. BANTZ, Thomas E. CHEFALAS, Steven J. MASTRIANNI, Clifford Alan PICKOVER
  • Publication number: 20080222043
    Abstract: Computer implemented method, system and computer usable program code for recovering application software in a data processing system. A computer implemented method for recovering application software in a data processing system includes receiving user data and application data from a plurality of users over a computer network, wherein the application data relates to application software of the plurality of users and includes application license data for applications that include a license. The received user data and application data are stored. A request is received over the computer network from a user of the plurality of users to recover application software of the user, and the requested application software is provided to the user over the computer network, wherein the provided application software is enabled and configured based on the user data and application data related to the provided application software.
    Type: Application
    Filed: March 7, 2007
    Publication date: September 11, 2008
    Inventors: Thomas Edward Chefalas, Steven J. Mastrianni, Clifford Alan Pickover
  • Publication number: 20080195723
    Abstract: In a first aspect of the present invention, methods and apparatus implement graphical user interfaces for interactively specifying service level agreements used to regulate delivery of services to, for example, computer systems. An interactive graphical user interface allows a user to see the effects of varying values of service delivery variables on the level of service achievable in a particular service delivery context. In a second aspect, methods and apparatus of the present invention provision resources required for service delivery. In the second aspect, the methods and apparatus of the present invention select a service delivery model dependent on context. The selected service delivery model is used to provision resources that will be required during service delivery. In a third aspect, methods and apparatus of the present invention monitor compliance with a service level agreement during a service delivery event.
    Type: Application
    Filed: April 4, 2008
    Publication date: August 14, 2008
    Inventors: David F. Bantz, Thomas E. Chefalas, Peter W. Gayek, Walter C. Huber, Srikant Jalan, Patrik Lehrner, Steven J. Mastrianni, Marco Porak
  • Publication number: 20080183864
    Abstract: The present invention concerns methods and apparatus that categorize states of computer systems selected to receive state-dependent maintenance activities as a prelude to the performance of those maintenance activities. In methods and apparatus of the present invention, it is determined, for example, that a certain version of an application program operating in computer systems having a specific operating system will be updated. A signature corresponding to the combination of the application program and operating system is incorporated in a software agent. The software agent is designed to poll computer systems in order to identify targets drawn from a population of computer systems that have states corresponding to the signature incorporated in the software agent. All computer systems maintenance activity performed on them.
    Type: Application
    Filed: April 2, 2008
    Publication date: July 31, 2008
    Inventors: David F. Bantz, Steven J. Mastrianni, Clifford A. Pickover
  • Publication number: 20080168065
    Abstract: In an embodiment of the present invention a web collaboration tool is utilized for collecting references to the web pages visited by a user and displaying a visual indication of the visited pages in the browser when another user or group member views a previously visited page. The present invention also relates to a web collaboration server aiding the tool in receiving the identifiers of visited pages, storing the identifiers in a database and reporting the identifier to other users when they visit a web page already visited. Additionally, the present invention also relates to a method of visually differentiating links in a Word document using some special symbol to indicate visited links when printing in black and white.
    Type: Application
    Filed: January 5, 2007
    Publication date: July 10, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dimitri Kanevsky, Steven J. Mastrianni, Clifford A. Pickover
  • Publication number: 20080167964
    Abstract: A system and method for implementing a customer incentive program that conditionally rewards a customer based upon the customer's movement through a shopping area and/or responses to questions which refer to the shopping area, sections of the shopping area and/or products located in the shopping area. While moving through a shopping area, a customer is monitored using a customer tracking system and/or presented with questions using a customer interface device. The customer is rewarded based upon the nature of the customer's movements and/or the nature of the customer's responses. The customer incentive program is designed to expose a customer to particular sections of a shopping area or specified products in the shopping area in order to motivate customer impulse buying.
    Type: Application
    Filed: March 25, 2008
    Publication date: July 10, 2008
    Applicant: Inernational Business Machines Corporation
    Inventors: Thomas E. Chefalas, Steven J. Mastrianni, Ajay Mohindra, Clifford A. Pickover
  • Publication number: 20080168158
    Abstract: A virtual device hub, into which local devices are plugged, enables those devices to be virtualized locally and with a remote virtual machine. Those devices then appear as available to the remote application, and can be used, for example, to print a report being processed on the remote host to a printer located at the user's physical location. The user's virtual device hub is a small computer device with network capability that is able to access the remote virtual machine. When the user runs an application, the application is actually being run in the remote virtual machine.
    Type: Application
    Filed: March 21, 2008
    Publication date: July 10, 2008
    Inventors: David F. Bantz, Thomas E. Chefalas, Steven J. Mastrianni, Clifford Alan Pickover