Patents by Inventor AARON JAMES QUIRK
AARON JAMES QUIRK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10749773Abstract: Embodiments provide optimized deployment of workloads. A first workload to be deployed in at least one data center of a plurality of data centers is received. A first plurality of candidate data centers is selected from the plurality of data centers, and the first workload is deployed to each of the first plurality of candidate data centers. A first performance metric is collected from each respective data center of the first plurality of candidate data centers based on execution of the first workload deployed at the respective data centers, and a first optimal data center from the first plurality of candidate data centers is identified based on the first performance metrics. The first workload is removed from each of the first plurality of candidate data centers, other than the identified first optimal data center.Type: GrantFiled: July 6, 2018Date of Patent: August 18, 2020Assignee: International Business Machines CorporationInventors: Hugh Edward Hockett, Lin Sun, Aaron James Quirk
-
Patent number: 10739153Abstract: Auxiliary navigational assistance is provided by determining, by one or more processors, that a user traveling along a specified travel route with the assistance of a navigation system can use additional navigational assistance at a particular region of the specified travel route. Based on the determining, the one or more processors assign an unmanned vehicle to assist the user in traveling through the particular region along the specified travel route. Further, the one or more processors provide one or more auxiliary instructions to the user's navigation system directing the user to reference the unmanned vehicle within the particular region to assist the user in traveling through the particular region along the specified travel route. In operation, the particular region overlaps only a portion of the specified travel route.Type: GrantFiled: December 8, 2017Date of Patent: August 11, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lisa Seacat DeLuca, Shelbee Eigenbrode, Dana Price, Aaron James Quirk
-
Publication number: 20200014609Abstract: Embodiments provide optimized deployment of workloads. A first workload to be deployed in at least one data center of a plurality of data centers is received. A first plurality of candidate data centers is selected from the plurality of data centers, and the first workload is deployed to each of the first plurality of candidate data centers. A first performance metric is collected from each respective data center of the first plurality of candidate data centers based on execution of the first workload deployed at the respective data centers, and a first optimal data center from the first plurality of candidate data centers is identified based on the first performance metrics. The first workload is removed from each of the first plurality of candidate data centers, other than the identified first optimal data center.Type: ApplicationFiled: July 6, 2018Publication date: January 9, 2020Inventors: Hugh Edward HOCKETT, Lin Sun, Aaron James Quirk
-
Patent number: 10432634Abstract: Methods and systems for use in constraining access to network resources based on notification and compliance requirements. In various examples, an access point or similar device receives and stores notification information (e.g., from a network administrator device) for provision to targeted client devices in a notification message. The access point also receives target criteria for use in identifying target client devices that are accessing or attempting to access network resources via the access point. In some embodiments, access to network resources by a targeted client device is constrained pending completion of a compliance condition requirement associated with a notification message. Various levels of access to network resources may be applied to non-compliant target client devices. Following completion of compliance condition, a target client device is exempted from further receipt of the notification message.Type: GrantFiled: January 4, 2018Date of Patent: October 1, 2019Assignee: International Business Machines CorporationInventors: Lisa Seacat DeLuca, Dana Price, Aaron James Quirk, Shelbee Smith-Eigenbrode
-
Publication number: 20190207941Abstract: Methods and systems for use in constraining access to network resources based on notification and compliance requirements. In various examples, an access point or similar device receives and stores notification information (e.g., from a network administrator device) for provision to targeted client devices in a notification message. The access point also receives target criteria for use in identifying target client devices that are accessing or attempting to access network resources via the access point. In some embodiments, access to network resources by a targeted client device is constrained pending completion of a compliance condition requirement associated with a notification message. Various levels of access to network resources may be applied to non-compliant target client devices. Following completion of compliance condition, a target client device is exempted from further receipt of the notification message.Type: ApplicationFiled: January 4, 2018Publication date: July 4, 2019Inventors: Lisa Seacat DeLuca, Dana Price, Aaron James Quirk, Shelbee Smith-Eigenbrode
-
Publication number: 20190178659Abstract: Auxiliary navigational assistance is provided by determining, by one or more processors, that a user traveling along a specified travel route with the assistance of a navigation system can use additional navigational assistance at a particular region of the specified travel route. Based on the determining, the one or more processors assign an unmanned vehicle to assist the user in traveling through the particular region along the specified travel route. Further, the one or more processors provide one or more auxiliary instructions to the user's navigation system directing the user to reference the unmanned vehicle within the particular region to assist the user in traveling through the particular region along the specified travel route. In operation, the particular region overlaps only a portion of the specified travel route.Type: ApplicationFiled: December 8, 2017Publication date: June 13, 2019Inventors: Lisa Seacat DeLUCA, Shelbee EIGENBRODE, Dana PRICE, Aaron James QUIRK
-
Publication number: 20190165944Abstract: Providing authentication of a device includes determining whether a received passcode entry matches an authorized passcode stored in device memory and when it does not match, executing a notification to indicate that the received passcode is an incorrect passcode and requesting entry of another passcode. In response to determining that a consecutive threshold number of received passcodes do not match an authorized passcode entry stored in the device memory, the device determines whether the threshold number of received passcodes meets a predetermined quality threshold. In response to determining that the threshold number of received passcodes meets the predetermined quality threshold, an alert is transmitted to an authentication service. The device then receives a partial authentication response from the authentication service, and based on the partial authentication response, the device uses an alternate data protection rule for passcode authentication.Type: ApplicationFiled: November 27, 2017Publication date: May 30, 2019Inventors: Lin Sun, Liam S. Harpur, Aaron James Quirk
-
Patent number: 9985787Abstract: A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. Upon success, the state machine transitions to the continuous authentication state wherein data samples are captured as the user interacts with the device and compared with stored exemplary fingerprints. Preferably, the state machine enforces a negative identification technique to determine whether the individual currently interacting with the touchscreen is not the user from which the exemplary fingerprints were generated. Upon such negative authentication, the state machine transitions to the invalidation state. In this state, operations (e.g., screen lock) are performed to secure the device against an unauthenticated use.Type: GrantFiled: August 18, 2015Date of Patent: May 29, 2018Assignee: International Business Machines CorporationInventors: Aaron James Quirk, Ching-Yun Chao, Dennis DeLanoy Lingerfelt, William Daniel Whitt
-
Patent number: 9720784Abstract: A technique for cloud infrastructure backup in a virtualized environment utilizing shared storage includes obtaining a workload input/output (I/O) profile to the shared storage over a time period. An attempt to locate one or more time windows in the workload I/O profile for which a cloud infrastructure backup can be staged is initiated. In response to determining the cloud infrastructure backup can be staged during at least one of the time windows, staging of the cloud infrastructure backup is scheduled during a selected one of the time windows. In response to determining the cloud infrastructure backup cannot be staged during at least one of the time windows, an interference tolerance approach is employed for accessing the shared storage for active workloads and the cloud infrastructure backup during the staging of the cloud infrastructure backup.Type: GrantFiled: August 26, 2015Date of Patent: August 1, 2017Assignee: International Business Machines CorporationInventors: Edward Raymond Bernal, Rahul Ghosh, Ivan M. Heninger, Douglas Alan Larson, Aaron James Quirk
-
Patent number: 9705676Abstract: A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. Upon success, the state machine transitions to the continuous authentication state wherein data samples are captured as the user interacts with the device and compared with stored exemplary fingerprints. Preferably, the state machine enforces a negative identification technique to determine whether the individual currently interacting with the touchscreen is not the user from which the exemplary fingerprints were generated. Upon such negative authentication, the state machine transitions to the invalidation state. In this state, operations (e.g., screen lock) are performed to secure the device against an unauthenticated use.Type: GrantFiled: December 12, 2013Date of Patent: July 11, 2017Assignee: International Business Machines CorporationInventors: Aaron James Quirk, Ching-Yun Chao, Dennis DeLanoy Lingerfelt, William Daniel Whitt
-
Patent number: 9690669Abstract: A technique for cloud infrastructure backup in a virtualized environment utilizing shared storage includes obtaining a workload input/output (I/O) profile to the shared storage over a time period. An attempt to locate one or more time windows in the workload I/O profile for which a cloud infrastructure backup can be staged is initiated. In response to determining the cloud infrastructure backup can be staged during at least one of the time windows, staging of the cloud infrastructure backup is scheduled during a selected one of the time windows. In response to determining the cloud infrastructure backup cannot be staged during at least one of the time windows, an interference tolerance approach is employed for accessing the shared storage for active workloads and the cloud infrastructure backup during the staging of the cloud infrastructure backup.Type: GrantFiled: June 16, 2014Date of Patent: June 27, 2017Assignee: Internaitonal Business Machines CorporationInventors: Edward Raymond Bernal, Rahul Ghosh, Ivan M. Heninger, Douglas Alan Larson, Aaron James Quirk
-
Patent number: 9575991Abstract: A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. A respective target volume is provisioned for each of the one or more source volumes identified. Only dirty blocks are copied (in a snapshot mode that prevents an update to the one or more source volumes during the snapshot mode) from each of the one or more source volumes to its respective target volume. The one or more dirty blocks are then copied from each target volume to a backup medium.Type: GrantFiled: August 26, 2015Date of Patent: February 21, 2017Assignee: International Business Machines CorporationInventors: Rahul Ghosh, Aaron James Quirk, James Patrick Robbins, Drew Hoover Sternesky
-
Patent number: 9477683Abstract: A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. A respective target volume is provisioned for each of the one or more source volumes identified. Only dirty blocks are copied (in a snapshot mode that prevents an update to the one or more source volumes during the snapshot mode) from each of the one or more source volumes to its respective target volume. The one or more dirty blocks are then copied from each target volume to a backup medium.Type: GrantFiled: May 30, 2014Date of Patent: October 25, 2016Assignee: International Business Machines CorporationInventors: Rahul Ghosh, Aaron James Quirk, James Patrick Robbins, Drew Hoover Sternesky
-
Publication number: 20160226666Abstract: A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. Upon success, the state machine transitions to the continuous authentication state wherein data samples are captured as the user interacts with the device and compared with stored exemplary fingerprints. Preferably, the state machine enforces a negative identification technique to determine whether the individual currently interacting with the touchscreen is not the user from which the exemplary fingerprints were generated. Upon such negative authentication, the state machine transitions to the invalidation state. In this state, operations (e.g., screen lock) are performed to secure the device against an unauthenticated use.Type: ApplicationFiled: December 12, 2013Publication date: August 4, 2016Applicant: International Business Machines CorporationInventors: Aaron James Quirk, Ching-Yun Chao, Dennis DeLanoy Lingerfelt, William Daniel Whitt
-
Publication number: 20150365478Abstract: A technique for cloud infrastructure backup in a virtualized environment utilizing shared storage includes obtaining a workload input/output (I/O) profile to the shared storage over a time period. An attempt to locate one or more time windows in the workload I/O profile for which a cloud infrastructure backup can be staged is initiated. In response to determining the cloud infrastructure backup can be staged during at least one of the time windows, staging of the cloud infrastructure backup is scheduled during a selected one of the time windows. In response to determining the cloud infrastructure backup cannot be staged during at least one of the time windows, an interference tolerance approach is employed for accessing the shared storage for active workloads and the cloud infrastructure backup during the staging of the cloud infrastructure backup.Type: ApplicationFiled: August 26, 2015Publication date: December 17, 2015Inventors: EDWARD RAYMOND BERNAL, RAHUL GHOSH, IVAN M. HENINGER, DOUGLAS ALAN LARSON, AARON JAMES QUIRK
-
Publication number: 20150363413Abstract: A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. A respective target volume is provisioned for each of the one or more source volumes identified. Only dirty blocks are copied (in a snapshot mode that prevents an update to the one or more source volumes during the snapshot mode) from each of the one or more source volumes to its respective target volume. The one or more dirty blocks are then copied from each target volume to a backup medium.Type: ApplicationFiled: August 26, 2015Publication date: December 17, 2015Inventors: RAHUL GHOSH, AARON JAMES QUIRK, JAMES PATRICK ROBBINS, DREW HOOVER STERNESKY
-
Publication number: 20150356286Abstract: A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. Upon success, the state machine transitions to the continuous authentication state wherein data samples are captured as the user interacts with the device and compared with stored exemplary fingerprints. Preferably, the state machine enforces a negative identification technique to determine whether the individual currently interacting with the touchscreen is not the user from which the exemplary fingerprints were generated. Upon such negative authentication, the state machine transitions to the invalidation state. In this state, operations (e.g., screen lock) are performed to secure the device against an unauthenticated use.Type: ApplicationFiled: August 18, 2015Publication date: December 10, 2015Inventors: Aaron James Quirk, Ching-Yun Chao, Dennis DeLanoy Lingerfelt, William Daniel Whitt
-
Publication number: 20150347430Abstract: A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. A respective target volume is provisioned for each of the one or more source volumes identified. Only dirty blocks are copied (in a snapshot mode that prevents an update to the one or more source volumes during the snapshot mode) from each of the one or more source volumes to its respective target volume. The one or more dirty blocks are then copied from each target volume to a backup medium.Type: ApplicationFiled: May 30, 2014Publication date: December 3, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: RAHUL GHOSH, AARON JAMES QUIRK, JAMES PATRICK ROBBINS, DREW HOOVER STERNESKY