Patents by Inventor Susan K. Candelaria

Susan K. Candelaria has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170024150
    Abstract: Embodiments of the present invention provide systems, methods, and computer program products for managing computing devices to handle an input/output (I/O) request. In one embodiment, the I/O request may eligible for performance throttling based, at least in part, on the associated importance level for performing the received I/O request and one or more characteristics of the received I/O request. Embodiments of the present invention provide systems, methods, and computer program products for throttling the I/O request and transmitting the I/O request to a storage controller.
    Type: Application
    Filed: October 10, 2016
    Publication date: January 26, 2017
    Inventors: Susan K. Candelaria, Scott B. Compton, Deborah A. Furman, Ilene A. Goldman, Matthew J. Kalos, John R. Paveza, Beth A. Peterson, Dale F. Riedy, David M. Shackelford, Harry M. Yudenfriend
  • Publication number: 20170024134
    Abstract: Embodiments of the present invention provide systems, methods, and computer program products for managing computing devices to handle an input/output (I/O) request. In one embodiment, the I/O request may eligible for performance throttling based, at least in part, on the associated importance level for performing the received I/O request and one or more characteristics of the received I/O request. Embodiments of the present invention provide systems, methods, and computer program products for throttling the I/O request and transmitting the I/O request to a storage controller.
    Type: Application
    Filed: October 11, 2016
    Publication date: January 26, 2017
    Inventors: Susan K. Candelaria, Scott B. Compton, Deborah A. Furman, Ilene A. Goldman, Matthew J. Kalos, John R. Paveza, Beth A. Peterson, Dale F. Riedy, David M. Shackelford, Harry M. Yudenfriend
  • Publication number: 20160378694
    Abstract: Embodiments of the present invention provide systems, methods, and computer program products for managing computing devices to handle an input/output (I/O) request. In one embodiment, the I/O request may eligible for performance throttling based, at least in part, on the associated importance level for performing the received I/O request and one or more characteristics of the received I/O request. Embodiments of the present invention provide systems, methods, and computer program products for throttling the I/O request and transmitting the I/O request to a storage controller.
    Type: Application
    Filed: June 29, 2015
    Publication date: December 29, 2016
    Inventors: Susan K. Candelaria, Scott B. Compton, Deborah A. Furman, Ilene A. Goldman, Matthew J. Kalos, John R. Paveza, Beth A. Peterson, Dale F. Riedy, David M. Shackelford, Harry M. Yudenfriend
  • Publication number: 20160378703
    Abstract: An input/output (I/O) request is received that indicates a priority for performing the received I/O request by a storage controller. If a base device is not available to handle the received I/O request, whether the received I/O request is eligible for performance throttling is determined. The received I/O request is transmitted to the storage controller indicating whether the received I/O request is eligible for performance throttling. An alias device is allocated to the base device based on the priority for performing the received I/O request. If the throttling information received from the storage controller for the previous I/O request indicates that a request type of the received I/O request is not being throttled, and it is determined that the received I/O request is a new request, then a control block is representing the base device is flagged, indicating that the received I/O request is eligible for performance throttling.
    Type: Application
    Filed: March 11, 2016
    Publication date: December 29, 2016
    Inventors: Susan K. Candelaria, Scott B. Compton, Deborah A. Furman, Ilene A. Goldman, Matthew J. Kalos, John R. Paveza, Beth A. Peterson, Dale F. Riedy, David M. Shackelford, Harry M. Yudenfriend
  • Patent number: 9514072
    Abstract: An input/output (I/O) request is received that indicates a priority for performing the received I/O request by a storage controller. If a base device is not available to handle the received I/O request, whether the received I/O request is eligible for performance throttling is determined. The received I/O request is transmitted to the storage controller indicating whether the received I/O request is eligible for performance throttling. An alias device is allocated to the base device based on the priority for performing the received I/O request. If the throttling information received from the storage controller for the previous I/O request indicates that a request type of the received I/O request is not being throttled, and it is determined that the received I/O request is a new request, then a control block is representing the base device is flagged, indicating that the received I/O request is eligible for performance throttling.
    Type: Grant
    Filed: March 11, 2016
    Date of Patent: December 6, 2016
    Assignee: International Business Machines Corporation
    Inventors: Susan K. Candelaria, Scott B. Compton, Deborah A. Furman, Ilene A. Goldman, Matthew J. Kalos, John R. Paveza, Beth A. Peterson, Dale F. Riedy, David M. Shackelford, Harry M. Yudenfriend
  • Patent number: 9503455
    Abstract: To control access to a source storage device shared by a plurality of host systems, methods and systems include confirming a presence of an application on each host system of the plurality of host systems accessing the storage device. After confirming the presence of the application on each host system accessing the storage device, the application is run allowing each host system to access the storage device. A request is received from a new host system to access the storage device. A presence of the application is verified on the new host system. If the presence of the application is verified on the new host system, the new host system is provided with access to the storage device. If the presence of the application is not verified on the new host system, the new host system is denied access to the storage device.
    Type: Grant
    Filed: February 13, 2014
    Date of Patent: November 22, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susan K. Candelaria, Thomas C. Storms, Peter G. Sutton, John G. Thompson, Harry M. Yudenfriend
  • Publication number: 20160246694
    Abstract: In one embodiment, a method includes defining a hardware feature policy for one or more hardware components of a system; and enabling and/or disabling one or more hardware features of one or more of the hardware components based on the hardware feature policy, where the hardware feature policy comprises instructions to enable and/or disable access to the one or more hardware features based on one or more criteria.
    Type: Application
    Filed: May 4, 2016
    Publication date: August 25, 2016
    Inventors: Susan K. Candelaria, John R. Paveza
  • Publication number: 20160246596
    Abstract: In one embodiment, a computer program product includes a computer readable storage medium having stored/encoded thereon: first program instructions executable by a device to cause the device to define a hardware feature policy for one or more hardware components of a system; and second program instructions executable by the device to cause the device to enable and/or disabling one or more hardware features of one or more of the hardware components based on the hardware feature policy, where the hardware feature policy comprises instructions to enable and/or disable access to the one or more hardware features based on one or more criteria.
    Type: Application
    Filed: May 4, 2016
    Publication date: August 25, 2016
    Inventors: Susan K. Candelaria, John R. Paveza
  • Patent number: 9405469
    Abstract: A mapping system and method that enables a secure reservation mode for a plurality of logical unit numbers of a storage system, generates a plurality of secret reservation keys, and instructs a distributed client to utilize at least one of the secret reservation keys to register with the storage system and to issue secure persistent reserves to the plurality of logical unit numbers.
    Type: Grant
    Filed: August 11, 2015
    Date of Patent: August 2, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susan K. Candelaria, Scott B. Compton, Jared M. Minch, Richard A. Ripberger, Harry M. Yudenfriend
  • Patent number: 9400678
    Abstract: In one embodiment, a system includes a processor and logic integrated with and/or executable by the processor. The logic is adapted to: define a hardware feature policy for one or more hardware components of a system; and enable and/or disable one or more hardware features of one or more of the hardware components based on the hardware feature policy, wherein the hardware feature policy comprises instructions to enable and/or disable access to the one or most hardware features based on one or more criteria selected from a group consisting of: a feature access schedule; a volume feature access group; a job feature access group; and an user feature access group.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: July 26, 2016
    Assignee: International Business Machines Corporation
    Inventors: Susan K. Candelaria, John R. Paveza
  • Patent number: 9400679
    Abstract: In one embodiment, a method includes defining a hardware feature policy for one or more hardware components of a system; and enabling and/or disabling one or more hardware features of one or more of the hardware components based on the hardware feature policy, where the hardware feature policy comprises instructions to enable and/or disable access to the one or more hardware features based on one or more criteria selected from the group consisting of: a feature access schedule; a volume feature access group; a job feature access group; and an user feature access group.
    Type: Grant
    Filed: October 25, 2013
    Date of Patent: July 26, 2016
    Assignee: International Business Machines Corporation
    Inventors: Susan K. Candelaria, John R. Paveza
  • Patent number: 9378154
    Abstract: A mapping system and method that enables a secure reservation mode for a plurality of logical unit numbers of a storage system, generates a plurality of secret reservation keys, and instructs a distributed client to utilize at least one of the secret reservation keys to register with the storage system and to issue secure persistent reserves to the plurality of logical unit numbers.
    Type: Grant
    Filed: May 2, 2014
    Date of Patent: June 28, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susan K. Candelaria, Scott B. Compton, Jared M. Minch, Richard A. Ripberger, Harry M. Yudenfriend
  • Publication number: 20150378832
    Abstract: Provided are a computer program product, system, and method for performing a remote point-in-time copy to a source and target storages in further mirror copy relationships. Each of a plurality of source copy relationships is from the source storage to one corresponding source copy storage. Each of a plurality of target copy relationships is from the target storage to one corresponding target copy storage, where in each relationship an indicator indicates whether to use a remote first type copy operation. The first type copy operation is used to copy data from the source storage to the target storage and copy data from the source copy storage to the target copy storage for the determined source and target copy relationships having the indicator set. A second type of copy operations is used for source and target relationships not having the indicator set.
    Type: Application
    Filed: June 25, 2014
    Publication date: December 31, 2015
    Inventors: Theresa M. Brown, Susan K. Candelaria, Nedlaya Y. Francisco, Lisa J. Gundy, Corey G. Smeaton, Warren K. Stanley, Jeffrey R. Suarez
  • Publication number: 20150363286
    Abstract: Provided are a computer program product, system, and method for establishing copy pairs from primary volumes to secondary volumes in multiple secondary storage systems for a failover session. For each of the copy pairs, data is mirrored from the primary storage system to the associated secondary storage system in the copy pair. A failure is detected at the primary storage system. Selection is made of a selected secondary storage system of the secondary storage systems in response to detecting the failure, wherein a plurality of the secondary storage systems are available for selection. The selected secondary storage system is indicated as a new primary storage system to which host requests are directed.
    Type: Application
    Filed: June 13, 2014
    Publication date: December 17, 2015
    Inventors: David R. Blea, Susan K. Candelaria, Nicolas M. Clayton, Lisa J. Gundy, Tri M. Hoang, Bengt E. Larsson, William J. Rooney, Michael J. Shannon, Corey G. Smeaton, Warren K. Stanley
  • Publication number: 20150355860
    Abstract: In one embodiment, a computer program product for managing a reserve command includes a computer readable storage medium having program code embodied therewith, the program code readable and/or executable by a processor to receive, by the processor, a request to access a data set on one or more volumes of at least one direct access storage device (DASD), the request including a reserve command, and each of the one or more volumes including a consecutive set of one or more tracks of the at least one DASD, and reserve one or more extents of the at least one DASD while reserving less than a volume of the at least one DASD and not allowing any other entity than an entity which requested the reserve to access the one or more extents of the at least one DASD that have been reserved.
    Type: Application
    Filed: June 10, 2014
    Publication date: December 10, 2015
    Inventors: Susan K. Candelaria, Clint A. Hardy, Gavin S. Johnson, Matthew J. Kalos, Michael J. Koester, John R. Paveza, Carrie J. Van Noorden
  • Publication number: 20150347766
    Abstract: A mapping system and method that enables a secure reservation mode for a plurality of logical unit numbers of a storage system, generates a plurality of secret reservation keys, and instructs a distributed client to utilize at least one of the secret reservation keys to register with the storage system and to issue secure persistent reserves to the plurality of logical unit numbers.
    Type: Application
    Filed: August 11, 2015
    Publication date: December 3, 2015
    Inventors: Susan K. Candelaria, Scott B. Compton, Jared M. Minch, Richard A. Ripberger, Harry M. Yudenfriend
  • Publication number: 20150317254
    Abstract: A mapping system and method that enables a secure reservation mode for a plurality of logical unit numbers of a storage system, generates a plurality of secret reservation keys, and instructs a distributed client to utilize at least one of the secret reservation keys to register with the storage system and to issue secure persistent reserves to the plurality of logical unit numbers.
    Type: Application
    Filed: May 2, 2014
    Publication date: November 5, 2015
    Applicant: International Business Machines Corporation
    Inventors: Susan K. Candelaria, Scott B. Compton, Jared M. Minch, Richard A. Ripberger, Harry M. Yudenfriend
  • Publication number: 20150229642
    Abstract: To control access to a source storage device shared by a plurality of host systems, methods and systems include confirming a presence of an application on each host system of the plurality of host systems accessing the storage device. After confirming the presence of the application on each host system accessing the storage device, the application is run allowing each host system to access the storage device. A request is received from a new host system to access the storage device. A presence of the application is verified on the new host system. If the presence of the application is verified on the new host system, the new host system is provided with access to the storage device. If the presence of the application is not verified on the new host system, the new host system is denied access to the storage device.
    Type: Application
    Filed: February 13, 2014
    Publication date: August 13, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susan K. CANDELARIA, Thomas C. STORMS, Peter G. SUTTON, John G. THOMPSON, Harry M. YUDENFRIEND
  • Publication number: 20140280815
    Abstract: In one embodiment, a system includes a processor and logic integrated with and/or executable by the processor. The logic is adapted to: define a hardware feature policy for one or more hardware components of a system; and enable and/or disable one or more hardware features of one or more of the hardware components based on the hardware feature policy, wherein the hardware feature policy comprises instructions to enable and/or disable access to the one or most hardware features based on one or more criteria selected from a group consisting of: a feature access schedule, a volume feature access group; a job feature access group; and an user feature access group.
    Type: Application
    Filed: March 12, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susan K. Candelaria, John R. Paveza
  • Publication number: 20140280842
    Abstract: In one embodiment, a method includes defining a hardware feature policy for one or more hardware components of a system; and enabling and/or disabling one or more hardware features of one or more of the hardware components based on the hardware feature policy, where the hardware feature policy comprises instructions to enable and/or disable access to the one or more hardware features based on one or more criteria selected from the group consisting of: a feature access schedule; a volume feature access group; a job feature access group; and an user feature access group.
    Type: Application
    Filed: October 25, 2013
    Publication date: September 18, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susan K. Candelaria, John R. Paveza