Patents by Inventor Thomas Creamer

Thomas Creamer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20050076191
    Abstract: A method for gathering operational metrics can include the step of identifying a host within a grid environment, wherein the host can be a software object. A ghost agent can be associated with the host. The ghost agent can replicate actions of the host. Operational metrics for at least a portion of the replicated actions can be determined. The operational metrics can be recorded. The host can move within the grid environment. The ghost agent can responsively move in accordance with movement of the host.
    Type: Application
    Filed: September 19, 2003
    Publication date: April 7, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050065803
    Abstract: A method for supporting an application can include the step of receiving a problem indication relating to the application. The method can also identify a host within a grid environment, wherein a host can be a software object used by said application. A ghost agent can be associated with the host. The actions of the host can be replicated for use by the ghost agent. Data relating to the replicated actions can be recorded using the ghost agent. The indicated problem can be responded to, where the response can be based at least in part upon the recorded data.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20050066309
    Abstract: A validation method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host, where the ghost agent can move within the grid environment. The actions of the host can be replicated by the ghost agent. Data related to the replicated actions can be compared with validation data. Validation output can be generated based upon the comparison.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Michael Mirt
  • Publication number: 20050065994
    Abstract: A method for restricting resources consumed by a ghost agent can include the step of registering a ghost agent within a domain. The ghost agent can move across domains of a grid environment responsive to movements of an associated host. Once registered, a containment policy for the domain can be received by the ghost agent. The ghost agent can be configured according to the received containment policy. The containment policy can be utilized to restrict resources that are available to the ghost agent.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20050065766
    Abstract: A testing method including the step of identifying multiple hosts located within multiple grids of a grid environment, wherein each host is a software object. A ghost agent can be associated with each identified host. Actions of the host can be replicated within each ghost agent. Data relating to the replicated actions can be recorded. Test input can be generated from the recorded data. Tests can be conducted within the grid environment using the test input.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050065992
    Abstract: One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20050066310
    Abstract: A method for debugging software objects within a grid environment including the step identifying a host, wherein the host is a software object. A ghost agent can be associated with the host. The ghost agent can replicate actions executed by the host. The host can be debugged based upon the replicated actions. The ghost agent can move from one grid within the grid environment to another grid.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050066025
    Abstract: A method for evaluating system behavior of an application domain within a grid environment can include the step of identifying a host software object within the application domain. A software object can be associated with the host software object. Within the associated software object, host actions can be replicated. Replicated actions can be recorded. The host software object can move from one grid within the grid environment to a different grid. The associated software object can responsively move within the grid environment in accordance with movement of the host software object.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050050138
    Abstract: A method for serving applications including receiving a component status publication and acquiring a client request. The component status publication can specify a usage level for an application component. A server response for the client request can be selected from among a multitude of possible server responses based at least in part upon the component status publication. Each possible server response can differentially utilize application components. The client request can be response to by conveying the selected server response.
    Type: Application
    Filed: September 3, 2003
    Publication date: March 3, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050050139
    Abstract: A method of handling requests can include the step of handling requests with a handler. An overload condition can be detected for said handler. Requests can be directed to an alternative handler. A return timer can be initialized. When the return timer exceeds a time threshold for the alternative handler, requests can be routed to the handler. The time threshold can be automatically adjusted based upon a time in which the handler handles requests.
    Type: Application
    Filed: September 3, 2003
    Publication date: March 3, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050047559
    Abstract: A method of aggregating interactive voice response services from a plurality of interactive voice response systems can include, for at least one caller, storing service information for a plurality of services within an interactive voice response system. Each service can be accessible through a corresponding one of the plurality of interactive voice response systems. The method further can include receiving a call from the caller and receiving an input from the caller over the call, wherein the input identifies at least one of the plurality of services and corresponding interactive voice response systems. The method also can include accessing the interactive voice response system corresponding to the identified service on behalf of the caller, retrieving information from the interactive voice response system, and providing the retrieved information to the caller.
    Type: Application
    Filed: August 27, 2003
    Publication date: March 3, 2005
    Applicant: International Business Machines Corporation
    Inventors: Vicki Colson, Thomas Creamer, Brent Davis, Peeyush Jaiswal, Victor Moore