Patents Represented by Attorney, Agent or Law Firm Arthur J. Samodovitz
  • Patent number: 7681132
    Abstract: Computer system, method and program for graphically representing network intrusions. Source icons are displayed in rows in a first column. The source icons represent source IP addresses from which intrusions were sent. Destination icons are displayed in rows in a second column. The destination icons represent destination IP addresses to which the intrusions were sent. The destination icons that receive intrusions from a same source icon are clustered together in the graphical representation across from the same source icon. An arrow is displayed from each of the source icons pointing to each of the destination icons to which each source icon sent an intrusion, such that there are “N” arrows from each source icon to “N” destination icons to which each source icon sent at least one intrusion.
    Type: Grant
    Filed: July 13, 2006
    Date of Patent: March 16, 2010
    Assignee: International Business Machines Corporation
    Inventor: James J. Treinen
  • Patent number: 7661026
    Abstract: A computer system and method for allowing either a primary computer or a backup computer to access a hardware resource, depending on which computer is executing an application that needs the hardware resource. A switch is connected to the hardware resource, the primary computer and the backup computer such that in one state, the switch connects the hardware resource to the primary computer, and in another state, the switch connects the hardware resource to the backup computer. Initially, the primary computer executes the application using the hardware resource. However, when the primary computer ceases to execute the application, the switch connects the hardware resource to the backup computer, and the backup computer executes the application or copy thereof using the hardware resource.
    Type: Grant
    Filed: May 21, 2004
    Date of Patent: February 9, 2010
    Assignee: International Business Machines Corporation
    Inventor: Diego Risi
  • Patent number: 7644313
    Abstract: A method for detecting a failure in a computing system and for restoring the system is provided. The method comprises providing a system connected to a network communications channel, creating, using a configured backup automation tool, a full system backup image and incremental archive logs of the system before attempting to remotely install software on the system and executing a point-in-time detection and restoration tool configured to detect a system failure when attempting to remotely install software on the system and, if the system failure is detected, to restore the system to a desired restoration point before the system failure occurred, using the full system backup image and incremental archive logs created of the system.
    Type: Grant
    Filed: February 14, 2006
    Date of Patent: January 5, 2010
    Assignee: International Business Machines Corporation
    Inventors: Mickey Iqbal, Rajeev Puri, H. Choong Thio
  • Patent number: 7616583
    Abstract: A computer determines a first plurality of servers which have a lease set to expire within a predetermined period or current or projected peak utilization greater than a predetermined percentage of their capacity. The computer determines a second plurality of servers which have sufficient lease term and excess capacity. The computer determines and records which servers of the first plurality to consolidate on servers of the second plurality based on sufficient capacity, match of application(s) and projected life span of the application(s) of the second plurality, and determines a schedule for retiring the servers of the first plurality with the applications having insufficient projected lifespan, and estimates cost savings for the consolidation.
    Type: Grant
    Filed: July 9, 2004
    Date of Patent: November 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: Jonathan Power, Kevin Galloway, Terry Harrison
  • Patent number: 7603459
    Abstract: A system, method and computer program product for determining active connections likely needed to handle client requests. First program instructions repeatedly detect active connections between a first server and other servers. Second program instructions determine how often an active connection between the first server and each of the other servers has been detected. Third program instructions determine when each of the active connections was last detected. Fourth program instructions form a table listing the active connections, how often or how frequently each of the active connections has been detected, and when each of the active connections was last detected. Preferably, the fourth program instructions highlight in the table one or more of the active connections which were not detected as active during a most recent iteration by the first program instructions.
    Type: Grant
    Filed: September 14, 2004
    Date of Patent: October 13, 2009
    Assignee: International Business Machines Corporation
    Inventors: A.K.M Kamrul Alam, Vyacheslav Barsuk
  • Patent number: 7564977
    Abstract: A final agent of the message provides a first encryption key to a first agent, interposed between a message sender and the final agent. The first agent but not the final agent knows an identity of the sender. The final agent provides a second encryption key to a second agent, interposed between the sender and the final agent. The second agent knows an identity of the sender. The first agent generates a third encryption key and provides the first encryption key and the third encryption key to the sender. The second agent generates a fourth encryption key and provides the second encryption key and the fourth encryption key to the sender. The first agent receives from the sender a message encrypted with the first, second, third and fourth keys, and in response, decrypts the message based on the third key. Afterwards, the first agent provides the message decrypted based on the third key to the second agent. In response, the second agent decrypts, based on the fourth key, the message provided by the first agent.
    Type: Grant
    Filed: February 24, 2005
    Date of Patent: July 21, 2009
    Assignee: International Business Machines Corporation
    Inventors: Anna Marino, Frank Seliger, Bernard Van Acker
  • Patent number: 7552276
    Abstract: System, method and program for managing a storage server comprising first and second clusters of storage controllers. The first cluster comprises one or more storage controllers each controlling one or more storage arrays. The first cluster also comprises a first cache memory and a first nonvolatile storage (“NVS”) shared by the one or more storage controllers of the first cluster. The second cluster comprises one or more storage controllers each controlling one or more storage arrays. The second cluster also comprises a second cache memory and a second nonvolatile storage shared by the one or more storage controllers of the second cluster. There is monitoring of an amount of time that data controlled by each of the clusters is held in the cache memory of the cluster before being outpaged to the storage arrays. There is monitoring of an amount of requests to access storage arrays of a cluster that were delayed due to insufficient NVS.
    Type: Grant
    Filed: February 27, 2008
    Date of Patent: June 23, 2009
    Assignee: International Business Machines Corporation
    Inventors: Brett M. Allison, Elise Bobitt
  • Patent number: 7529185
    Abstract: Under the present invention, communication flows between applications in the multi-tiered environment are identified. For each communication flow identified, bandwidth consumption is determined. In general, the bandwidth consumption for a communication flow is determined based on a set of variables that includes one or more of the following: whether the communication flow is persistent, a payload/package size of the communication flow, a quantity of destination computers (endpoints) for the communication flow, a required delivery time for the communication flow, a desired network utilization for the communication flow, and a rate of simultaneous use of applications involved the communication flow. Once determined, the bandwidth consumption for the individual communication flows can be aggregated to determine the total bandwidth consumption across the environment. Using this value, decisions can be made about the best way to deploy or arrange the environment.
    Type: Grant
    Filed: January 26, 2005
    Date of Patent: May 5, 2009
    Assignee: International Business Machines Corporation
    Inventors: Kenneth D. Christiance, Gregg W. Machovec
  • Patent number: 7523291
    Abstract: Aliasing errors, occasioned by, for example, a programming error resulting in including extra or missing bits in a storage address, wrong addressing mode, or wrong address context, are detected by providing a storage address configuration including gaps in valid addresses. Such a programming error is detected and an exception is thrown (that is, an addressing error is detected and indicated) responsive to an address reference to such a gap in valid addresses. Gaps are configured at complementary address ranges to facilitate detection of such aliasing errors.
    Type: Grant
    Filed: July 26, 2005
    Date of Patent: April 21, 2009
    Assignee: International Business Machines Corporation
    Inventors: William A. Holder, Damian L. Osisek, Thomas M. Vail, Donald P. Wilton
  • Patent number: 7519592
    Abstract: System, method and computer program for initiating a search at a server computer. A data base including a URL of the server computer is stored at a client computer. Information entered by a user into the client computer is received. From the information, a search term and the URL of the server computer are identified. Then, an HTTP search request which includes the URL of the server computer and the search term is generated. Then, the HTTP search request is sent to the server computer. The identifying of the URL of the server computer comprises searching the data base for a character string contained in the information that matches the URL of the server computer. The identifying of the search term comprises identifying a portion of the information appended to the URL of the server. The identifying of the search term also comprises omitting from the portion one or more symbols adjacent to the search term which are inconsistent with a search request using HTTP.
    Type: Grant
    Filed: September 14, 2004
    Date of Patent: April 14, 2009
    Assignee: International Business Machines Corporation
    Inventors: Ian Hughes, Nicholas James Midgley
  • Patent number: 7519561
    Abstract: Computer system, method and program for estimating an increase in software license cost for executing a computer program with a first processor(s) instead of a second, less powerful processor(s). An identification is made of a plurality of computers in which the computer program is currently installed. The total processor power of the plurality of computers is determined. The existing license cost(s) for executing the computer program in the plurality of computers is determined. The existing license cost(s) is divided by the total processor power of the plurality of computers to determine license cost per unit of processor power. The difference of processor power between the first processor(s) and the second processor(s) is multiplied times the license cost per unit of processor power to estimate the increase in software license cost. Alternatives to paying the upgrade license fee are also considered.
    Type: Grant
    Filed: November 10, 2005
    Date of Patent: April 14, 2009
    Assignee: International Business Machines Corporation
    Inventors: Marna J. Boomershine, Jamie B. Marsnik, Thomas M. Smalley
  • Patent number: 7500037
    Abstract: Managing locks under conditions wherein there is a first shared hold on a lock. There is a first pending request for a first exclusive hold on the lock; the first pending request for said first exclusive hold is made after the first shared hold was granted. There is a second pending request for a second exclusive hold on the lock; the second pending request for the second exclusive hold is made after the first pending request for the first exclusive hold. There is a third pending request for a second shared hold; the third pending request for the second shared hold is made after the second pending request for the second exclusive hold. First program instructions grant one of the pending requests for an exclusive hold in response to the first shared hold being released. Second program instructions grant the third pending request for the second shared hold in response to release of the exclusive hold previously granted in response to the one request for an exclusive hold.
    Type: Grant
    Filed: January 30, 2007
    Date of Patent: March 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Kevin Scott Adams, Mark John Lorenc, Damian Leo Osisek
  • Patent number: 7490324
    Abstract: A method for communication between first and second computer programs having a shared memory. The first computer program has a first work dispatcher for a first work queue. The second computer program has a second work dispatcher for a second work queue. Without causing an interrupt, a message or data is written for the second program from the first program to the shared memory and the second work queue is updated with a work item indicating a message or data for the second program. In association with the updating step, it is determined if the second program is currently busy. If so, the second program is not interrupted regarding the message or data. When the second program subsequently becomes not busy, the second program receives, without an interrupt, and executes the work item to receive the message or data. If the second program was not currently busy, the second program is interrupted to process the message or data on its work queue. This imposes a minimal burden on the second program.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: February 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: Steven S. Shultz, Xenia Tkatschow
  • Patent number: 7480737
    Abstract: A single firewall or cluster of firewalls with a public IP address is interfaced to an internet public subnet to receive service requests for a cluster of network servers. A first private subnet with a plurality of private IP addresses is interfaced to the single firewall or cluster of firewalls to receive the service requests after passing through a firewall. A plurality of redundant load balancers with a respective plurality of private IP addresses are interfaced to the first private subnet to receive the service requests after passing through the first private subnet. The load balancers are interfaced to a second private subnet. The network servers with respective private IP addresses are interfaced to the second private subnet to receive the service requests from the load balancers. At an initialization time, a private IP address is defined for the network load balancer system within the internet access subnet.
    Type: Grant
    Filed: September 30, 2003
    Date of Patent: January 20, 2009
    Assignee: International Business Machines Corporation
    Inventors: Pascal Chauffour, Eric Lebrun, Valerie Mahe
  • Patent number: 7474217
    Abstract: System and method for tracking inventory of a multiplicity of products. First RFID tags are associated with respective products or groups of products. Second Active RFID tags are associated with respective first containers for the multiplicity products. A third Active RFID tag is associated with a second container for the first containers. First RFID tags broadcast their respective identifications. Second Active RFID tags hash the identities of the first RFID tags within their respective first containers and broad their hashed values. Third Active RFID tag hash the hashed values broadcast by the second Active RFID tags. An expected value is compared to a result of the third Active RFID tag hashing the hashed values broadcast by the second Active RFID tags.
    Type: Grant
    Filed: November 14, 2007
    Date of Patent: January 6, 2009
    Assignee: International Business Machines Corporation
    Inventors: Kevin D. Himberger, Clark D. Jeffries, Mohammad Peyravian
  • Patent number: 7464249
    Abstract: Mapping of address space by providing real storage including first and second address spaces. The second address space is smaller than and contained within the first address space. Provided within virtual storage is a system execution space. Providing within the system execution space is a system execution area having a size equal to or less than the second address space. The system execution area includes a control program having a first portion capable of addressing the first address space and the system execution space, a second portion constrained to address only the second address space and the system execution area, and at least one alias page. Responsive to a control program request for a first page in the virtual storage, a first frame is assigned in real storage corresponding to the page. Responsive to a request from the second portion of the control program for the first page, allocating an alias page in the system execution area, the alias page backed by the first frame.
    Type: Grant
    Filed: July 26, 2005
    Date of Patent: December 9, 2008
    Assignee: International Business Machines Corporation
    Inventors: James P. Hennessy, William A. Holder, Damian L. Osisek
  • Patent number: 7457871
    Abstract: System, method and computer program product for identifying a failed component in a system comprising application servers, storage servers and a switch fabric. The switch fabric has first ports coupled to the application servers, second ports coupled to third ports of the storage servers and internal switches to interconnect the first ports to second ports. Each of the application servers compiles records of its own attempts to communicate with the storage servers via the switch fabric. Each of the records indicates one of the third ports and one of the storage servers for each of the communication attempts. From the records a determination is made if any of the communications was successful to one of the storage servers. If not, a determination is made that the one storage server may have failed.
    Type: Grant
    Filed: October 7, 2004
    Date of Patent: November 25, 2008
    Assignee: International Business Machines Corporation
    Inventor: Vyacheslav Barsuk
  • Patent number: 7406657
    Abstract: A method of synchronizing an audio and visual presentation in a multi-modal browser. A form having at least one field requiring user supplied information is provided to a multi-modal browser. Blank fields within the form are filled in by user who provides either verbal or tactile interaction, or a combination of verbal and tactile interaction. The browser moves to the next field requiring user provided input. Finally, the form exits after the user has supplied input for all required fields.
    Type: Grant
    Filed: September 22, 2000
    Date of Patent: July 29, 2008
    Assignee: International Business Machines Corporation
    Inventors: Patrick Callaghan, Stephen V. Feustel, Michael J. Howland, Steven M. Pritko
  • Patent number: 7398434
    Abstract: A system, method and program for troubleshooting a problem with an application. An application server which is supposed to be executing the application and a database or a server which manages the database are identified. The application, when executing, obtains data from the database to respond to a client request. The application server, database or database server, and a connection between the application server and the database or database server are generated and displayed or printed. Also, one or more hyperlinks to automatically send a hardware, software, or network status inquiry to the application server to test operability of the application server and/or a connection to the application server and automatically send a hardware, software, or network status inquiry to the database server to test operability of the database server and/or a connection to the database server are generated and displayed or printed.
    Type: Grant
    Filed: May 11, 2007
    Date of Patent: July 8, 2008
    Assignee: International Business Machines Corporation
    Inventors: John Jason Auvenshine, Justin Christopher Blackburn, Christopher Joel Jacoby
  • Patent number: 7389510
    Abstract: A system, method and program product for operating a cluster of servers. A load balancer, separate from the servers, selects servers to handle respective work requests assigned to the cluster based on a load balancing algorithm, and sends the work requests to the selected servers. The load balancer receives a request from another server not currently a member of the cluster. The request requests that the other server become a member of the cluster to handle work requests. In response to the request, the load balancer joins the other server as a member of the cluster to handle some work requests subsequently assigned to the cluster. The other server specifies to the load balancer a load threshold for the other server. The other server specifies to the load balancer a time-out to be used for the other server. The time-out indicates a time allotted for the other server to send a hello message since sending a previous hello message.
    Type: Grant
    Filed: November 6, 2003
    Date of Patent: June 17, 2008
    Assignee: International Business Machines Corporation
    Inventor: Jason D. Forrester