Patents by Inventor Alexander Neef

Alexander Neef has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10671492
    Abstract: A method for improving integrity and availability of data in a data center is provided. The data center is part of a network of data centers. The data centers in the network are adapted to act as a backup service provider. The method comprises registering backup service profile data of each of the data centers with viable data. The method also comprises accessing a forecast of monitorable events for a region, analyzing the forecast to predict a potential threat, identifying a data center in the regions, and determine a data center within the network of data centers as backup service provider. If more than one suitable backup service providers is identified, determine a best match backup service provider, establishing a backup communication connection, and transferring data from the source data center to the target data center.
    Type: Grant
    Filed: December 18, 2017
    Date of Patent: June 2, 2020
    Assignee: International Business Machines Corporation
    Inventors: Joerg Mueller, Stefan Alexander, Alexander Neef, Jan Vorbohle, Michael H. Schlachter, Klaus Rindtorff
  • Patent number: 10623357
    Abstract: According to one embodiment, a method for message-thread management with a messaging client is provided. The method may include receiving a message-thread containing a signature and a body, with the signature including a composite identifier which may include a thread identifier, a tangent identifier, a sender identifier, a depth-level identifier, and a unique message identifier, determining that message-thread content is missing from the message-thread, sending a broadcast message using a peer-to-peer protocol requesting the missing message-thread content, and receiving the missing message-thread content via the peer-to-peer protocol. The message client may include a peer-to-peer communication protocol manager for handling the peer-to-peer protocol.
    Type: Grant
    Filed: April 30, 2018
    Date of Patent: April 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Stefan Alexander, Alexander Neef, Matthias Seul
  • Patent number: 10528392
    Abstract: Descriptions of a plurality of information technology resources are maintained in a computer-readable storage medium. A plurality of evaluation strategies a maintained, wherein the evaluation strategies associate a plurality of rules with forms of changes to the plurality of information technology resources. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the method determines that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, at least one of the plurality of rules is evaluated and the operation of the at least one rule is performed.
    Type: Grant
    Filed: September 19, 2016
    Date of Patent: January 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gerd Breiter, Dominik Jall, Markus Mueller, Alexander Neef, Martin Reitz
  • Publication number: 20190188089
    Abstract: A method for improving integrity and availability of data in a data center is provided. The data center is part of a network of data centers. The data centers in the network are adapted to act as a backup service provider. The method comprises registering backup service profile data of each of the data centers with viable data. The method also comprises accessing a forecast of monitorable events for a region, analyzing the forecast to predict a potential threat, identifying a data center in the regions, and determine a data center within the network of data centers as backup service provider. If more than one suitable backup service providers is identified, determine a best match backup service provider, establishing a backup communication connection, and transferring data from the source data center to the target data center.
    Type: Application
    Filed: December 18, 2017
    Publication date: June 20, 2019
    Inventors: Joerg Mueller, Stefan Alexander, Alexander Neef, Jan Vorbohle, Michael H. Schlachter, Klaus Rindtorff
  • Publication number: 20180248826
    Abstract: According to one embodiment, a method for message-thread management with a messaging client is provided. The method may include receiving a message-thread containing a signature and a body, with the signature including a composite identifier which may include a thread identifier, a tangent identifier, a sender identifier, a depth-level identifier, and a unique message identifier, determining that message-thread content is missing from the message-thread, sending a broadcast message using a peer-to-peer protocol requesting the missing message-thread content, and receiving the missing message-thread content via the peer-to-peer protocol. The message client may include a peer-to-peer communication protocol manager for handling the peer-to-peer protocol.
    Type: Application
    Filed: April 30, 2018
    Publication date: August 30, 2018
    Inventors: Stefan Alexander, Alexander Neef, Matthias Seul
  • Patent number: 10055304
    Abstract: An in-memory application has a state is associated with data (CA0, CB0, CC0) stored in a memory and accessed by the application. A first restore point of the application is determined to represent a first time point (T0) in the execution time associated with a first state at which the application accesses the data being stored in memory locations (CA0) using first addresses (S1) and first pointers (A0) which are stored in a first data structure. A first restore point identifier is assigned to the first restore point, whose value is indicative of (T0). The first restore point identifier is stored in association with (A0) and (S1) in a first entry of a second data structure. In the first data structure, the first addresses (S1) are associated to second pointers (A1) to contents of memory locations (CA1) in the memory, and redirecting writing operations.
    Type: Grant
    Filed: March 25, 2015
    Date of Patent: August 21, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alexander Neef, Martin Oberhofer, Andreas Trinks, Andreas Uhl
  • Patent number: 9998414
    Abstract: According to one embodiment, a method for message-thread management with a messaging client is provided. The method may include receiving a message-thread containing a signature and a body, with the signature including a composite identifier which may include a thread identifier, a tangent identifier, a sender identifier, a depth-level identifier, and a unique message identifier, determining that message-thread content is missing from the message-thread, sending a broadcast message using a peer-to-peer protocol requesting the missing message-thread content, and receiving the missing message-thread content via the peer-to-peer protocol. The message client may include a peer-to-peer communication protocol manager for handling the peer-to-peer protocol.
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: June 12, 2018
    Assignee: International Business Machines Corporation
    Inventors: Stefan Alexander, Alexander Neef, Matthias Seul
  • Publication number: 20180052742
    Abstract: An in-memory application has a state is associated with data (CA0, CB0, CC0) stored in a memory and accessed by the application. A first restore point of the application is determined to represent a first time point (T0) in the execution time associated with a first state at which the application accesses the data being stored in memory locations (CA0) using first addresses (S1) and first pointers (A0) which are stored in a first data structure. A first restore point identifier is assigned to the first restore point, whose value is indicative of (T0). The first restore point identifier is stored in association with (A0) and (S1) in a first entry of a second data structure. In the first data structure, the first addresses (S1) are associated to second pointers (A1) to contents of memory locations (CA1) in the memory, and redirecting writing operations.
    Type: Application
    Filed: March 25, 2015
    Publication date: February 22, 2018
    Applicant: International Business Machines Corporation
    Inventors: ALEXANDER NEEF, Martin Oberhofer, Andreas Trinks, Andreas Uhl
  • Publication number: 20170134323
    Abstract: According to one embodiment, a method for message-thread management with a messaging client is provided. The method may include receiving a message-thread containing a signature and a body, with the signature including a composite identifier which may include a thread identifier, a tangent identifier, a sender identifier, a depth-level identifier, and a unique message identifier, determining that message-thread content is missing from the message-thread, sending a broadcast message using a peer-to-peer protocol requesting the missing message-thread content, and receiving the missing message-thread content via the peer-to-peer protocol. The message client may include a peer-to-peer communication protocol manager for handling the peer-to-peer protocol.
    Type: Application
    Filed: November 5, 2015
    Publication date: May 11, 2017
    Inventors: Stefan Alexander, Alexander Neef, Matthias Seul
  • Patent number: 9619338
    Abstract: A method and/or computer program product recovers files that are generated by an application running on a client-server system that comprises a back-up client with a client back-up tool and a server with a server back-up tool. Application files are backed up on the server, and then restored to a back-up client based on file usage behavior of the application and their priority, and file stubs are created for remaining files. File usage behavior of the application performing data recovery and regular data processing after said restore process are monitored and analyzed, and files in different types of priority classes are classified based on file usage behavior. Existing file stubs at the back-up client are replaced with corresponding file content from the back-up server during runtime of the application based on predetermined criteria.
    Type: Grant
    Filed: September 22, 2014
    Date of Patent: April 11, 2017
    Assignee: International Business Machines Corporation
    Inventors: Felix Hamborg, Alexander Neef
  • Publication number: 20170004016
    Abstract: Descriptions of a plurality of information technology resources are maintained in a computer-readable storage medium. A plurality of evaluation strategies a maintained, wherein the evaluation strategies associate a plurality of rules with forms of changes to the plurality of information technology resources. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the method determines that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, at least one of the plurality of rules is evaluated and the operation of the at least one rule is performed.
    Type: Application
    Filed: September 19, 2016
    Publication date: January 5, 2017
    Inventors: Gerd Breiter, Dominik Jall, Markus Mueller, Alexander Neef, Martin Reitz
  • Patent number: 9449273
    Abstract: A method includes maintaining descriptions of a plurality of information technology resources in a computer-readable storage medium. The method includes maintaining a plurality of evaluation strategies, wherein the evaluation strategies associate a plurality of rules with forms of changes to the plurality of information technology resources. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the method determines that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, the method evaluates the at least one of the plurality of rules and performs the operation of the at least one rule.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: September 20, 2016
    Assignee: International Business Machines Corporation
    Inventors: Gerd Breiter, Dominik Jall, Markus Mueller, Alexander Neef, Martin Reitz
  • Publication number: 20150220405
    Abstract: An in-memory application has a state is associated with data (CA0, CB0, CC0) stored in a memory and accessed by the application. A first restore point of the application is determined to represent a first time point (T0) in the execution time associated with a first state at which the application accesses the data being stored in memory locations (CA0) using first addresses (S1) and first pointers (A0) which are stored in a first data structure. A first restore point identifier is assigned to the first restore point, whose value is indicative of (T0). The first restore point identifier is stored in association with (A0) and (S1) in a first entry of a second data structure. In the first data structure, the first addresses (S1) are associated to second pointers (A1) to contents of memory locations (CA1) in the memory, and redirecting writing operations.
    Type: Application
    Filed: March 25, 2015
    Publication date: August 6, 2015
    Applicant: International Business Machines Corporation
    Inventors: ALEXANDER NEEF, Martin Oberhofer, Andreas Trinks, Andreas Uhl
  • Publication number: 20150088831
    Abstract: A method and/or computer program product recovers files that are generated by an application running on a client-server system that comprises a back-up client with a client back-up tool and a server with a server back-up tool. Application files are backed up on the server, and then restored to a back-up client based on file usage behavior of the application and their priority, and file stubs are created for remaining files. File usage behavior of the application performing data recovery and regular data processing after said restore process are monitored and analyzed, and files in different types of priority classes are classified based on file usage behavior. Existing file stubs at the back-up client are replaced with corresponding file content from the back-up server during runtime of the application based on predetermined criteria.
    Type: Application
    Filed: September 22, 2014
    Publication date: March 26, 2015
    Inventors: Felix Hamborg, Alexander Neef
  • Patent number: 8812424
    Abstract: A computer program product includes a storage medium with program code configured to maintain descriptions of a plurality of information technology resources in a computer-readable storage medium. The program code is configured to maintain a plurality of evaluation strategies. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the program code is configured to determine that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, the program code is configured to evaluate the at least one of the plurality of rules and performs the operation of the at least one rule.
    Type: Grant
    Filed: June 30, 2010
    Date of Patent: August 19, 2014
    Assignee: International Business Machines Corporation
    Inventors: Gerd Breiter, Dominik Jall, Markus Mueller, Alexander Neef, Martin Reitz
  • Publication number: 20120215733
    Abstract: A method includes maintaining descriptions of a plurality of information technology resources in a computer-readable storage medium. The method includes maintaining a plurality of evaluation strategies, wherein the evaluation strategies associate a plurality of rules with forms of changes to the plurality of information technology resources. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the method determines that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, the method evaluates the at least one of the plurality of rules and performs the operation of the at least one rule.
    Type: Application
    Filed: April 30, 2012
    Publication date: August 23, 2012
    Applicant: International Business Machines Corporation
    Inventors: Gerd Breiter, Dominik Jall, Markus Mueller, Alexander Neef, Martin Reitz
  • Publication number: 20110022560
    Abstract: A method includes maintaining descriptions of a plurality of information technology resources in a computer-readable storage medium. The method includes maintaining a plurality of evaluation strategies, wherein the evaluation strategies associate a plurality of rules with forms of changes to the plurality of information technology resources. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the method determines that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, the method evaluates the at least one of the plurality of rules and performs the operation of the at least one rule.
    Type: Application
    Filed: June 30, 2010
    Publication date: January 27, 2011
    Applicant: International Business Machines Corporation
    Inventors: Gerd Breiter, Dominik Jall, Markus Mueller, Alexander Neef, Martin Reitz