Patents by Inventor AARON JAMES QUIRK

AARON JAMES QUIRK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10749773
    Abstract: Embodiments provide optimized deployment of workloads. A first workload to be deployed in at least one data center of a plurality of data centers is received. A first plurality of candidate data centers is selected from the plurality of data centers, and the first workload is deployed to each of the first plurality of candidate data centers. A first performance metric is collected from each respective data center of the first plurality of candidate data centers based on execution of the first workload deployed at the respective data centers, and a first optimal data center from the first plurality of candidate data centers is identified based on the first performance metrics. The first workload is removed from each of the first plurality of candidate data centers, other than the identified first optimal data center.
    Type: Grant
    Filed: July 6, 2018
    Date of Patent: August 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Hugh Edward Hockett, Lin Sun, Aaron James Quirk
  • Patent number: 10739153
    Abstract: Auxiliary navigational assistance is provided by determining, by one or more processors, that a user traveling along a specified travel route with the assistance of a navigation system can use additional navigational assistance at a particular region of the specified travel route. Based on the determining, the one or more processors assign an unmanned vehicle to assist the user in traveling through the particular region along the specified travel route. Further, the one or more processors provide one or more auxiliary instructions to the user's navigation system directing the user to reference the unmanned vehicle within the particular region to assist the user in traveling through the particular region along the specified travel route. In operation, the particular region overlaps only a portion of the specified travel route.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: August 11, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lisa Seacat DeLuca, Shelbee Eigenbrode, Dana Price, Aaron James Quirk
  • Publication number: 20200014609
    Abstract: Embodiments provide optimized deployment of workloads. A first workload to be deployed in at least one data center of a plurality of data centers is received. A first plurality of candidate data centers is selected from the plurality of data centers, and the first workload is deployed to each of the first plurality of candidate data centers. A first performance metric is collected from each respective data center of the first plurality of candidate data centers based on execution of the first workload deployed at the respective data centers, and a first optimal data center from the first plurality of candidate data centers is identified based on the first performance metrics. The first workload is removed from each of the first plurality of candidate data centers, other than the identified first optimal data center.
    Type: Application
    Filed: July 6, 2018
    Publication date: January 9, 2020
    Inventors: Hugh Edward HOCKETT, Lin Sun, Aaron James Quirk
  • Patent number: 10432634
    Abstract: Methods and systems for use in constraining access to network resources based on notification and compliance requirements. In various examples, an access point or similar device receives and stores notification information (e.g., from a network administrator device) for provision to targeted client devices in a notification message. The access point also receives target criteria for use in identifying target client devices that are accessing or attempting to access network resources via the access point. In some embodiments, access to network resources by a targeted client device is constrained pending completion of a compliance condition requirement associated with a notification message. Various levels of access to network resources may be applied to non-compliant target client devices. Following completion of compliance condition, a target client device is exempted from further receipt of the notification message.
    Type: Grant
    Filed: January 4, 2018
    Date of Patent: October 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Dana Price, Aaron James Quirk, Shelbee Smith-Eigenbrode
  • Publication number: 20190207941
    Abstract: Methods and systems for use in constraining access to network resources based on notification and compliance requirements. In various examples, an access point or similar device receives and stores notification information (e.g., from a network administrator device) for provision to targeted client devices in a notification message. The access point also receives target criteria for use in identifying target client devices that are accessing or attempting to access network resources via the access point. In some embodiments, access to network resources by a targeted client device is constrained pending completion of a compliance condition requirement associated with a notification message. Various levels of access to network resources may be applied to non-compliant target client devices. Following completion of compliance condition, a target client device is exempted from further receipt of the notification message.
    Type: Application
    Filed: January 4, 2018
    Publication date: July 4, 2019
    Inventors: Lisa Seacat DeLuca, Dana Price, Aaron James Quirk, Shelbee Smith-Eigenbrode
  • Publication number: 20190178659
    Abstract: Auxiliary navigational assistance is provided by determining, by one or more processors, that a user traveling along a specified travel route with the assistance of a navigation system can use additional navigational assistance at a particular region of the specified travel route. Based on the determining, the one or more processors assign an unmanned vehicle to assist the user in traveling through the particular region along the specified travel route. Further, the one or more processors provide one or more auxiliary instructions to the user's navigation system directing the user to reference the unmanned vehicle within the particular region to assist the user in traveling through the particular region along the specified travel route. In operation, the particular region overlaps only a portion of the specified travel route.
    Type: Application
    Filed: December 8, 2017
    Publication date: June 13, 2019
    Inventors: Lisa Seacat DeLUCA, Shelbee EIGENBRODE, Dana PRICE, Aaron James QUIRK
  • Publication number: 20190165944
    Abstract: Providing authentication of a device includes determining whether a received passcode entry matches an authorized passcode stored in device memory and when it does not match, executing a notification to indicate that the received passcode is an incorrect passcode and requesting entry of another passcode. In response to determining that a consecutive threshold number of received passcodes do not match an authorized passcode entry stored in the device memory, the device determines whether the threshold number of received passcodes meets a predetermined quality threshold. In response to determining that the threshold number of received passcodes meets the predetermined quality threshold, an alert is transmitted to an authentication service. The device then receives a partial authentication response from the authentication service, and based on the partial authentication response, the device uses an alternate data protection rule for passcode authentication.
    Type: Application
    Filed: November 27, 2017
    Publication date: May 30, 2019
    Inventors: Lin Sun, Liam S. Harpur, Aaron James Quirk
  • Patent number: 9985787
    Abstract: A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. Upon success, the state machine transitions to the continuous authentication state wherein data samples are captured as the user interacts with the device and compared with stored exemplary fingerprints. Preferably, the state machine enforces a negative identification technique to determine whether the individual currently interacting with the touchscreen is not the user from which the exemplary fingerprints were generated. Upon such negative authentication, the state machine transitions to the invalidation state. In this state, operations (e.g., screen lock) are performed to secure the device against an unauthenticated use.
    Type: Grant
    Filed: August 18, 2015
    Date of Patent: May 29, 2018
    Assignee: International Business Machines Corporation
    Inventors: Aaron James Quirk, Ching-Yun Chao, Dennis DeLanoy Lingerfelt, William Daniel Whitt
  • Patent number: 9720784
    Abstract: A technique for cloud infrastructure backup in a virtualized environment utilizing shared storage includes obtaining a workload input/output (I/O) profile to the shared storage over a time period. An attempt to locate one or more time windows in the workload I/O profile for which a cloud infrastructure backup can be staged is initiated. In response to determining the cloud infrastructure backup can be staged during at least one of the time windows, staging of the cloud infrastructure backup is scheduled during a selected one of the time windows. In response to determining the cloud infrastructure backup cannot be staged during at least one of the time windows, an interference tolerance approach is employed for accessing the shared storage for active workloads and the cloud infrastructure backup during the staging of the cloud infrastructure backup.
    Type: Grant
    Filed: August 26, 2015
    Date of Patent: August 1, 2017
    Assignee: International Business Machines Corporation
    Inventors: Edward Raymond Bernal, Rahul Ghosh, Ivan M. Heninger, Douglas Alan Larson, Aaron James Quirk
  • Patent number: 9705676
    Abstract: A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. Upon success, the state machine transitions to the continuous authentication state wherein data samples are captured as the user interacts with the device and compared with stored exemplary fingerprints. Preferably, the state machine enforces a negative identification technique to determine whether the individual currently interacting with the touchscreen is not the user from which the exemplary fingerprints were generated. Upon such negative authentication, the state machine transitions to the invalidation state. In this state, operations (e.g., screen lock) are performed to secure the device against an unauthenticated use.
    Type: Grant
    Filed: December 12, 2013
    Date of Patent: July 11, 2017
    Assignee: International Business Machines Corporation
    Inventors: Aaron James Quirk, Ching-Yun Chao, Dennis DeLanoy Lingerfelt, William Daniel Whitt
  • Patent number: 9690669
    Abstract: A technique for cloud infrastructure backup in a virtualized environment utilizing shared storage includes obtaining a workload input/output (I/O) profile to the shared storage over a time period. An attempt to locate one or more time windows in the workload I/O profile for which a cloud infrastructure backup can be staged is initiated. In response to determining the cloud infrastructure backup can be staged during at least one of the time windows, staging of the cloud infrastructure backup is scheduled during a selected one of the time windows. In response to determining the cloud infrastructure backup cannot be staged during at least one of the time windows, an interference tolerance approach is employed for accessing the shared storage for active workloads and the cloud infrastructure backup during the staging of the cloud infrastructure backup.
    Type: Grant
    Filed: June 16, 2014
    Date of Patent: June 27, 2017
    Assignee: Internaitonal Business Machines Corporation
    Inventors: Edward Raymond Bernal, Rahul Ghosh, Ivan M. Heninger, Douglas Alan Larson, Aaron James Quirk
  • Patent number: 9575991
    Abstract: A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. A respective target volume is provisioned for each of the one or more source volumes identified. Only dirty blocks are copied (in a snapshot mode that prevents an update to the one or more source volumes during the snapshot mode) from each of the one or more source volumes to its respective target volume. The one or more dirty blocks are then copied from each target volume to a backup medium.
    Type: Grant
    Filed: August 26, 2015
    Date of Patent: February 21, 2017
    Assignee: International Business Machines Corporation
    Inventors: Rahul Ghosh, Aaron James Quirk, James Patrick Robbins, Drew Hoover Sternesky
  • Patent number: 9477683
    Abstract: A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. A respective target volume is provisioned for each of the one or more source volumes identified. Only dirty blocks are copied (in a snapshot mode that prevents an update to the one or more source volumes during the snapshot mode) from each of the one or more source volumes to its respective target volume. The one or more dirty blocks are then copied from each target volume to a backup medium.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: October 25, 2016
    Assignee: International Business Machines Corporation
    Inventors: Rahul Ghosh, Aaron James Quirk, James Patrick Robbins, Drew Hoover Sternesky
  • Publication number: 20160226666
    Abstract: A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. Upon success, the state machine transitions to the continuous authentication state wherein data samples are captured as the user interacts with the device and compared with stored exemplary fingerprints. Preferably, the state machine enforces a negative identification technique to determine whether the individual currently interacting with the touchscreen is not the user from which the exemplary fingerprints were generated. Upon such negative authentication, the state machine transitions to the invalidation state. In this state, operations (e.g., screen lock) are performed to secure the device against an unauthenticated use.
    Type: Application
    Filed: December 12, 2013
    Publication date: August 4, 2016
    Applicant: International Business Machines Corporation
    Inventors: Aaron James Quirk, Ching-Yun Chao, Dennis DeLanoy Lingerfelt, William Daniel Whitt
  • Publication number: 20150365478
    Abstract: A technique for cloud infrastructure backup in a virtualized environment utilizing shared storage includes obtaining a workload input/output (I/O) profile to the shared storage over a time period. An attempt to locate one or more time windows in the workload I/O profile for which a cloud infrastructure backup can be staged is initiated. In response to determining the cloud infrastructure backup can be staged during at least one of the time windows, staging of the cloud infrastructure backup is scheduled during a selected one of the time windows. In response to determining the cloud infrastructure backup cannot be staged during at least one of the time windows, an interference tolerance approach is employed for accessing the shared storage for active workloads and the cloud infrastructure backup during the staging of the cloud infrastructure backup.
    Type: Application
    Filed: August 26, 2015
    Publication date: December 17, 2015
    Inventors: EDWARD RAYMOND BERNAL, RAHUL GHOSH, IVAN M. HENINGER, DOUGLAS ALAN LARSON, AARON JAMES QUIRK
  • Publication number: 20150363413
    Abstract: A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. A respective target volume is provisioned for each of the one or more source volumes identified. Only dirty blocks are copied (in a snapshot mode that prevents an update to the one or more source volumes during the snapshot mode) from each of the one or more source volumes to its respective target volume. The one or more dirty blocks are then copied from each target volume to a backup medium.
    Type: Application
    Filed: August 26, 2015
    Publication date: December 17, 2015
    Inventors: RAHUL GHOSH, AARON JAMES QUIRK, JAMES PATRICK ROBBINS, DREW HOOVER STERNESKY
  • Publication number: 20150356286
    Abstract: A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. Upon success, the state machine transitions to the continuous authentication state wherein data samples are captured as the user interacts with the device and compared with stored exemplary fingerprints. Preferably, the state machine enforces a negative identification technique to determine whether the individual currently interacting with the touchscreen is not the user from which the exemplary fingerprints were generated. Upon such negative authentication, the state machine transitions to the invalidation state. In this state, operations (e.g., screen lock) are performed to secure the device against an unauthenticated use.
    Type: Application
    Filed: August 18, 2015
    Publication date: December 10, 2015
    Inventors: Aaron James Quirk, Ching-Yun Chao, Dennis DeLanoy Lingerfelt, William Daniel Whitt
  • Publication number: 20150347430
    Abstract: A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. A respective target volume is provisioned for each of the one or more source volumes identified. Only dirty blocks are copied (in a snapshot mode that prevents an update to the one or more source volumes during the snapshot mode) from each of the one or more source volumes to its respective target volume. The one or more dirty blocks are then copied from each target volume to a backup medium.
    Type: Application
    Filed: May 30, 2014
    Publication date: December 3, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: RAHUL GHOSH, AARON JAMES QUIRK, JAMES PATRICK ROBBINS, DREW HOOVER STERNESKY