Patents by Inventor Albert Schirmer
Albert Schirmer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10387211Abstract: Managing a virtual computer resource on at least one virtual machine. The managing of the virtual computer resource on the at least one virtual machine is by controlling execution of the virtual computer resource on the at least one virtual machine by a virtual machine instance, such as a firmware facility, of a trusted part of a computer system. The virtual machine instance is unique in the computer system.Type: GrantFiled: December 12, 2017Date of Patent: August 20, 2019Assignee: International Business Machines CorporationInventors: Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
-
Patent number: 10282195Abstract: Techniques are disclosed for concurrently loading a plurality of new modules while code of a plurality of modules of an original computer program is loaded and executed on a computer system. An associated method may include allocating a module thread local storage (TLS) block for each thread within an initial computer program, wherein the allocated module TLS blocks are large enough to hold all module thread variables that are loaded or to be loaded. The method further may include reserving spare areas between the module TLS blocks for adding new module thread variables and arranging at an end of the module TLS blocks a thread data template section for resetting threads or creating new threads. The method may result in addition of modules to the original computer program and/or application of a concurrent patch through replacement of one or more of the plurality of original computer program modules.Type: GrantFiled: November 30, 2017Date of Patent: May 7, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Angel Nunez Mencias, Albert Schirmer, Christine Axnix, Stefan Usenbinz
-
Patent number: 10228993Abstract: As the file system of an operating system program might be damaged by a crash, the file system is usually used neither for the selection of data to be dumped from a memory nor for the analysis of the dumped data, and all data contained in one or several areas of the memory are dumped. In order to preserve the integrity of the file system and enable its use after the crash, the memory is divided into a primary and a secondary memory section during a memory setup, file system data are transferred from the primary memory section to the secondary memory section widely out of the control of the operating system program, and a read access of a dump program is directed to the secondary memory section in order to select file system data to be dumped after the crash using error data.Type: GrantFiled: November 21, 2016Date of Patent: March 12, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor Rafael Escobar Olmos, Jakob Christopher Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
-
Publication number: 20180113749Abstract: Managing a virtual computer resource on at least one virtual machine. The managing of the virtual computer resource on the at least one virtual machine is by controlling execution of the virtual computer resource on the at least one virtual machine by a virtual machine instance, such as a firmware facility, of a trusted part of a computer system. The virtual machine instance is unique in the computer system.Type: ApplicationFiled: December 12, 2017Publication date: April 26, 2018Inventors: Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
-
Patent number: 9952910Abstract: Managing a virtual computer resource on at least one virtual machine. The managing of the virtual computer resource on the at least one virtual machine is by controlling execution of the virtual computer resource on the at least one virtual machine by a virtual machine instance, such as a firmware facility, of a trusted part of a computer system. The virtual machine instance is unique in the computer system.Type: GrantFiled: November 30, 2015Date of Patent: April 24, 2018Assignee: International Business Machines CorporationInventors: Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
-
Publication number: 20180088934Abstract: Techniques are disclosed for concurrently loading a plurality of new modules while code of a plurality of modules of an original computer program is loaded and executed on a computer system. An associated method may include allocating a module thread local storage (TLS) block for each thread within an initial computer program, wherein the allocated module TLS blocks are large enough to hold all module thread variables that are loaded or to be loaded. The method further may include reserving spare areas between the module TLS blocks for adding new module thread variables and arranging at an end of the module TLS blocks a thread data template section for resetting threads or creating new threads. The method may result in addition of modules to the original computer program and/or application of a concurrent patch through replacement of one or more of the plurality of original computer program modules.Type: ApplicationFiled: November 30, 2017Publication date: March 29, 2018Inventors: Angel Nunez MENCIAS, Albert SCHIRMER, Christine AXNIX, Stefan USENBINZ
-
Patent number: 9904539Abstract: A method and data processing system are disclosed for concurrently loading a plurality of new modules while code of a plurality of modules of an original (i.e., currently running) computer program is loaded and executed on a computer system. The method may include allocating a module thread local storage (TLS) block for each thread within an initial computer program, wherein the allocated module TLS blocks are large enough to hold all module thread variables that are loaded or to be loaded. The method further may include providing constant offsets between module TLS block pointers corresponding to the module TLS blocks and the module thread variables for all of the threads. The disclosed method may be used to add modules to the original computer program and/or to apply a concurrent patch by replacing one or more of the plurality of original computer program modules.Type: GrantFiled: May 31, 2016Date of Patent: February 27, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Angel Nunez Mencias, Albert Schirmer, Christine Axnix, Stefan Usenbinz
-
Publication number: 20170068587Abstract: As the file system of an operating system program might be damaged by a crash, the file system is usually used neither for the selection of data to be dumped from a memory nor for the analysis of the dumped data, and all data contained in one or several areas of the memory are dumped. In order to preserve the integrity of the file system and enable its use after the crash, the memory is divided into a primary and a secondary memory section during a memory setup, file system data are transferred from the primary memory section to the secondary memory section widely out of the control of the operating system program, and a read access of a dump program is directed to the secondary memory section in order to select file system data to be dumped after the crash using error data.Type: ApplicationFiled: November 21, 2016Publication date: March 9, 2017Inventors: Victor Rafael Escobar Olmos, Jakob Christopher Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
-
Patent number: 9501344Abstract: As the file system of an operating system program might be damaged by a crash, the file system is usually used neither for the selection of data to be dumped from a memory nor for the analysis of the dumped data, and all data contained in one or several areas of the memory are dumped. In order to preserve the integrity of the file system and enable its use after the crash, the memory is divided into a primary and a secondary memory section during a memory setup, file system data are transferred from the primary memory section to the secondary memory section widely out of the control of the operating system program, and a read access of a dump program is directed to the secondary memory section in order to select file system data to be dumped after the crash using error data.Type: GrantFiled: November 12, 2014Date of Patent: November 22, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor Rafael Escobar Olmos, Jakob Christopher Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
-
Publication number: 20160274899Abstract: A method and data processing system are disclosed for concurrently loading a plurality of new modules while code of a plurality of modules of an original (i.e., currently running) computer program is loaded and executed on a computer system. The method may include allocating a module thread local storage (TLS) block for each thread within an initial computer program, wherein the allocated module TLS blocks are large enough to hold all module thread variables that are loaded or to be loaded. The method further may include providing constant offsets between module TLS block pointers corresponding to the module TLS blocks and the module thread variables for all of the threads. The disclosed method may be used to add modules to the original computer program and/or to apply a concurrent patch by replacing one or more of the plurality of original computer program modules.Type: ApplicationFiled: May 31, 2016Publication date: September 22, 2016Inventors: ANGEL NUNEZ MENCIAS, ALBERT SCHIRMER, CHRISTINE AXNIX, STEFAN USENBINZ
-
Patent number: 9436457Abstract: A method and data processing system are disclosed for concurrently loading a plurality of new modules while code of a plurality of modules of an original (i.e., currently running) computer program is loaded and executed on a computer system. The method may include allocating a module thread local storage (TLS) block for each thread within an initial computer program, wherein the allocated module TLS blocks are large enough to hold all module thread variables that are loaded or to be loaded. The method further may include providing constant offsets between module TLS block pointers corresponding to the module TLS blocks and the module thread variables for all of the threads. The disclosed method may be used to add modules to the original computer program and/or to apply a concurrent patch by replacing one or more of the plurality of original computer program modules.Type: GrantFiled: August 11, 2014Date of Patent: September 6, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Angel Nunez Mencias, Albert Schirmer, Christine Axnix, Stefan Usenbinz
-
Patent number: 9298536Abstract: Creating an operating system dump. A main memory of a computer system is divided into at least three contiguous memory areas, comprising a primary memory area, a secondary memory area and a data memory area. A first instance of an OS (operating system) is booted into the main memory, a second instance of the operating system is loaded into the secondary memory area using the active first instance of the operating system, execution of the first active instance of the OS is stopped if a critical execution error occurs, and the computer system is re-started using the loaded second instance of the operating system which becomes the active instance of the OS. A dump of the primary memory area is created, and a third instance of the operating system is loaded into the primary memory area.Type: GrantFiled: November 26, 2013Date of Patent: March 29, 2016Assignee: International Business Machines CorporationInventors: Reinhard Buendgen, Michael Holzheu, Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus, Martin Schwidefsky
-
Patent number: 9292325Abstract: Managing a virtual computer resource on at least one virtual machine. The managing of the virtual computer resource on the at least one virtual machine is by controlling execution of the virtual computer resource on the at least one virtual machine by a virtual machine instance, such as a firmware facility, of a trusted part of a computer system. The virtual machine instance is unique in the computer system.Type: GrantFiled: September 19, 2013Date of Patent: March 22, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
-
Publication number: 20160077856Abstract: Managing a virtual computer resource on at least one virtual machine. The managing of the virtual computer resource on the at least one virtual machine is by controlling execution of the virtual computer resource on the at least one virtual machine by a virtual machine instance, such as a firmware facility, of a trusted part of a computer system. The virtual machine instance is unique in the computer system.Type: ApplicationFiled: November 30, 2015Publication date: March 17, 2016Inventors: Jakob C. Lang, Angel Nunez Mencias, Albert SCHIRMER, Jochen SCHWEFLINGHAUS
-
Patent number: 9164846Abstract: In one aspect, a technique for restarting a software system on a computer platform after an unintentional software system shutdown. The technique includes, for instance, generating a core dump file on the computer platform when the software system shuts down unintentionally, restarting the software system, using a library for copying software system related data from the core dump file to the software system, and continuing execution of the software system.Type: GrantFiled: April 30, 2013Date of Patent: October 20, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
-
Publication number: 20150149830Abstract: As the file system of an operating system program might be damaged by a crash, the file system is usually used neither for the selection of data to be dumped from a memory nor for the analysis of the dumped data, and all data contained in one or several areas of the memory are dumped. In order to preserve the integrity of the file system and enable its use after the crash, the memory is divided into a primary and a secondary memory section during a memory setup, file system data are transferred from the primary memory section to the secondary memory section widely out of the control of the operating system program, and a read access of a dump program is directed to the secondary memory section in order to select file system data to be dumped after the crash using error data.Type: ApplicationFiled: November 12, 2014Publication date: May 28, 2015Inventors: Victor Rafael Escobar Olmos, Jakob Christopher Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus
-
Publication number: 20140351804Abstract: A method and data processing system are disclosed for concurrently loading a plurality of new modules while code of a plurality of modules of an original (i.e., currently running) computer program is loaded and executed on a computer system. The method may include allocating a module TLS block for each thread within an initial computer program, wherein the allocated module TLS blocks are large enough to hold all module thread variables that are loaded or to be loaded. The method further may include providing constant offsets between module TLS block pointers corresponding to the module TLS blocks and the module thread variables for all of the threads. The disclosed method may be used to add modules to the original computer program and/or to apply a concurrent patch by replacing one or more of the plurality of original computer program modules.Type: ApplicationFiled: August 11, 2014Publication date: November 27, 2014Inventors: ANGEL NUNEZ MENCIAS, ALBERT SCHIRMER, CHRISTINE AXNIX, STEFAN USENBINZ
-
Patent number: 8839225Abstract: A method and data processing system are disclosed for concurrently loading a plurality of new modules while code of a plurality of modules of an original (i.e., currently running) computer program is loaded and executed on a computer system. The method may comprise allocating a module TLS block for each thread within an initial computer program, wherein the allocated module TLS blocks are large enough to hold all module thread variables that are loaded or to be loaded. The method further may comprise providing constant offsets between module TLS block pointers corresponding to the module TLS blocks and the module thread variables for all of the threads. The disclosed method may be used to add modules to the original computer program and/or to apply a concurrent patch by replacing one or more of the plurality of original computer program modules.Type: GrantFiled: January 21, 2009Date of Patent: September 16, 2014Assignee: International Business Machines CorporationInventors: Angel Nunez Mencias, Albert Schirmer, Christine Axnix, Stefan Usenbinz
-
Publication number: 20140149799Abstract: Creating an operating system dump. A main memory of a computer system is divided into at least three contiguous memory areas, comprising a primary memory area, a secondary memory area and a data memory area. A first instance of an OS (operating system) is booted into the main memory, a second instance of the operating system is loaded into the secondary memory area using the active first instance of the operating system, execution of the first active instance of the OS is stopped if a critical execution error occurs, and the computer system is re-started using the loaded second instance of the operating system which becomes the active instance of the OS. A dump of the primary memory area is created, and a third instance of the operating system is loaded into the primary memory area.Type: ApplicationFiled: November 26, 2013Publication date: May 29, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Reinhard Buendgen, Michael Holzheu, Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus, Martin Schwidefsky
-
Publication number: 20140089922Abstract: Managing a virtual computer resource on at least one virtual machine. The managing of the virtual computer resource on the at least one virtual machine is by controlling execution of the virtual computer resource on the at least one virtual machine by a virtual machine instance, such as a firmware facility, of a trusted part of a computer system. The virtual machine instance is unique in the computer system.Type: ApplicationFiled: September 19, 2013Publication date: March 27, 2014Applicant: International Business Machines CorporationInventors: Jakob C. Lang, Angel Nunez Mencias, Albert Schirmer, Jochen Schweflinghaus