Patents by Inventor Alexander Neef
Alexander Neef has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10671492Abstract: A method for improving integrity and availability of data in a data center is provided. The data center is part of a network of data centers. The data centers in the network are adapted to act as a backup service provider. The method comprises registering backup service profile data of each of the data centers with viable data. The method also comprises accessing a forecast of monitorable events for a region, analyzing the forecast to predict a potential threat, identifying a data center in the regions, and determine a data center within the network of data centers as backup service provider. If more than one suitable backup service providers is identified, determine a best match backup service provider, establishing a backup communication connection, and transferring data from the source data center to the target data center.Type: GrantFiled: December 18, 2017Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Joerg Mueller, Stefan Alexander, Alexander Neef, Jan Vorbohle, Michael H. Schlachter, Klaus Rindtorff
-
Patent number: 10623357Abstract: According to one embodiment, a method for message-thread management with a messaging client is provided. The method may include receiving a message-thread containing a signature and a body, with the signature including a composite identifier which may include a thread identifier, a tangent identifier, a sender identifier, a depth-level identifier, and a unique message identifier, determining that message-thread content is missing from the message-thread, sending a broadcast message using a peer-to-peer protocol requesting the missing message-thread content, and receiving the missing message-thread content via the peer-to-peer protocol. The message client may include a peer-to-peer communication protocol manager for handling the peer-to-peer protocol.Type: GrantFiled: April 30, 2018Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Stefan Alexander, Alexander Neef, Matthias Seul
-
Patent number: 10528392Abstract: Descriptions of a plurality of information technology resources are maintained in a computer-readable storage medium. A plurality of evaluation strategies a maintained, wherein the evaluation strategies associate a plurality of rules with forms of changes to the plurality of information technology resources. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the method determines that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, at least one of the plurality of rules is evaluated and the operation of the at least one rule is performed.Type: GrantFiled: September 19, 2016Date of Patent: January 7, 2020Assignee: International Business Machines CorporationInventors: Gerd Breiter, Dominik Jall, Markus Mueller, Alexander Neef, Martin Reitz
-
Publication number: 20190188089Abstract: A method for improving integrity and availability of data in a data center is provided. The data center is part of a network of data centers. The data centers in the network are adapted to act as a backup service provider. The method comprises registering backup service profile data of each of the data centers with viable data. The method also comprises accessing a forecast of monitorable events for a region, analyzing the forecast to predict a potential threat, identifying a data center in the regions, and determine a data center within the network of data centers as backup service provider. If more than one suitable backup service providers is identified, determine a best match backup service provider, establishing a backup communication connection, and transferring data from the source data center to the target data center.Type: ApplicationFiled: December 18, 2017Publication date: June 20, 2019Inventors: Joerg Mueller, Stefan Alexander, Alexander Neef, Jan Vorbohle, Michael H. Schlachter, Klaus Rindtorff
-
Publication number: 20180248826Abstract: According to one embodiment, a method for message-thread management with a messaging client is provided. The method may include receiving a message-thread containing a signature and a body, with the signature including a composite identifier which may include a thread identifier, a tangent identifier, a sender identifier, a depth-level identifier, and a unique message identifier, determining that message-thread content is missing from the message-thread, sending a broadcast message using a peer-to-peer protocol requesting the missing message-thread content, and receiving the missing message-thread content via the peer-to-peer protocol. The message client may include a peer-to-peer communication protocol manager for handling the peer-to-peer protocol.Type: ApplicationFiled: April 30, 2018Publication date: August 30, 2018Inventors: Stefan Alexander, Alexander Neef, Matthias Seul
-
Patent number: 10055304Abstract: An in-memory application has a state is associated with data (CA0, CB0, CC0) stored in a memory and accessed by the application. A first restore point of the application is determined to represent a first time point (T0) in the execution time associated with a first state at which the application accesses the data being stored in memory locations (CA0) using first addresses (S1) and first pointers (A0) which are stored in a first data structure. A first restore point identifier is assigned to the first restore point, whose value is indicative of (T0). The first restore point identifier is stored in association with (A0) and (S1) in a first entry of a second data structure. In the first data structure, the first addresses (S1) are associated to second pointers (A1) to contents of memory locations (CA1) in the memory, and redirecting writing operations.Type: GrantFiled: March 25, 2015Date of Patent: August 21, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alexander Neef, Martin Oberhofer, Andreas Trinks, Andreas Uhl
-
Patent number: 9998414Abstract: According to one embodiment, a method for message-thread management with a messaging client is provided. The method may include receiving a message-thread containing a signature and a body, with the signature including a composite identifier which may include a thread identifier, a tangent identifier, a sender identifier, a depth-level identifier, and a unique message identifier, determining that message-thread content is missing from the message-thread, sending a broadcast message using a peer-to-peer protocol requesting the missing message-thread content, and receiving the missing message-thread content via the peer-to-peer protocol. The message client may include a peer-to-peer communication protocol manager for handling the peer-to-peer protocol.Type: GrantFiled: November 5, 2015Date of Patent: June 12, 2018Assignee: International Business Machines CorporationInventors: Stefan Alexander, Alexander Neef, Matthias Seul
-
Publication number: 20180052742Abstract: An in-memory application has a state is associated with data (CA0, CB0, CC0) stored in a memory and accessed by the application. A first restore point of the application is determined to represent a first time point (T0) in the execution time associated with a first state at which the application accesses the data being stored in memory locations (CA0) using first addresses (S1) and first pointers (A0) which are stored in a first data structure. A first restore point identifier is assigned to the first restore point, whose value is indicative of (T0). The first restore point identifier is stored in association with (A0) and (S1) in a first entry of a second data structure. In the first data structure, the first addresses (S1) are associated to second pointers (A1) to contents of memory locations (CA1) in the memory, and redirecting writing operations.Type: ApplicationFiled: March 25, 2015Publication date: February 22, 2018Applicant: International Business Machines CorporationInventors: ALEXANDER NEEF, Martin Oberhofer, Andreas Trinks, Andreas Uhl
-
Publication number: 20170134323Abstract: According to one embodiment, a method for message-thread management with a messaging client is provided. The method may include receiving a message-thread containing a signature and a body, with the signature including a composite identifier which may include a thread identifier, a tangent identifier, a sender identifier, a depth-level identifier, and a unique message identifier, determining that message-thread content is missing from the message-thread, sending a broadcast message using a peer-to-peer protocol requesting the missing message-thread content, and receiving the missing message-thread content via the peer-to-peer protocol. The message client may include a peer-to-peer communication protocol manager for handling the peer-to-peer protocol.Type: ApplicationFiled: November 5, 2015Publication date: May 11, 2017Inventors: Stefan Alexander, Alexander Neef, Matthias Seul
-
Patent number: 9619338Abstract: A method and/or computer program product recovers files that are generated by an application running on a client-server system that comprises a back-up client with a client back-up tool and a server with a server back-up tool. Application files are backed up on the server, and then restored to a back-up client based on file usage behavior of the application and their priority, and file stubs are created for remaining files. File usage behavior of the application performing data recovery and regular data processing after said restore process are monitored and analyzed, and files in different types of priority classes are classified based on file usage behavior. Existing file stubs at the back-up client are replaced with corresponding file content from the back-up server during runtime of the application based on predetermined criteria.Type: GrantFiled: September 22, 2014Date of Patent: April 11, 2017Assignee: International Business Machines CorporationInventors: Felix Hamborg, Alexander Neef
-
Publication number: 20170004016Abstract: Descriptions of a plurality of information technology resources are maintained in a computer-readable storage medium. A plurality of evaluation strategies a maintained, wherein the evaluation strategies associate a plurality of rules with forms of changes to the plurality of information technology resources. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the method determines that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, at least one of the plurality of rules is evaluated and the operation of the at least one rule is performed.Type: ApplicationFiled: September 19, 2016Publication date: January 5, 2017Inventors: Gerd Breiter, Dominik Jall, Markus Mueller, Alexander Neef, Martin Reitz
-
Patent number: 9449273Abstract: A method includes maintaining descriptions of a plurality of information technology resources in a computer-readable storage medium. The method includes maintaining a plurality of evaluation strategies, wherein the evaluation strategies associate a plurality of rules with forms of changes to the plurality of information technology resources. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the method determines that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, the method evaluates the at least one of the plurality of rules and performs the operation of the at least one rule.Type: GrantFiled: April 30, 2012Date of Patent: September 20, 2016Assignee: International Business Machines CorporationInventors: Gerd Breiter, Dominik Jall, Markus Mueller, Alexander Neef, Martin Reitz
-
Publication number: 20150220405Abstract: An in-memory application has a state is associated with data (CA0, CB0, CC0) stored in a memory and accessed by the application. A first restore point of the application is determined to represent a first time point (T0) in the execution time associated with a first state at which the application accesses the data being stored in memory locations (CA0) using first addresses (S1) and first pointers (A0) which are stored in a first data structure. A first restore point identifier is assigned to the first restore point, whose value is indicative of (T0). The first restore point identifier is stored in association with (A0) and (S1) in a first entry of a second data structure. In the first data structure, the first addresses (S1) are associated to second pointers (A1) to contents of memory locations (CA1) in the memory, and redirecting writing operations.Type: ApplicationFiled: March 25, 2015Publication date: August 6, 2015Applicant: International Business Machines CorporationInventors: ALEXANDER NEEF, Martin Oberhofer, Andreas Trinks, Andreas Uhl
-
Publication number: 20150088831Abstract: A method and/or computer program product recovers files that are generated by an application running on a client-server system that comprises a back-up client with a client back-up tool and a server with a server back-up tool. Application files are backed up on the server, and then restored to a back-up client based on file usage behavior of the application and their priority, and file stubs are created for remaining files. File usage behavior of the application performing data recovery and regular data processing after said restore process are monitored and analyzed, and files in different types of priority classes are classified based on file usage behavior. Existing file stubs at the back-up client are replaced with corresponding file content from the back-up server during runtime of the application based on predetermined criteria.Type: ApplicationFiled: September 22, 2014Publication date: March 26, 2015Inventors: Felix Hamborg, Alexander Neef
-
Patent number: 8812424Abstract: A computer program product includes a storage medium with program code configured to maintain descriptions of a plurality of information technology resources in a computer-readable storage medium. The program code is configured to maintain a plurality of evaluation strategies. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the program code is configured to determine that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, the program code is configured to evaluate the at least one of the plurality of rules and performs the operation of the at least one rule.Type: GrantFiled: June 30, 2010Date of Patent: August 19, 2014Assignee: International Business Machines CorporationInventors: Gerd Breiter, Dominik Jall, Markus Mueller, Alexander Neef, Martin Reitz
-
Publication number: 20120215733Abstract: A method includes maintaining descriptions of a plurality of information technology resources in a computer-readable storage medium. The method includes maintaining a plurality of evaluation strategies, wherein the evaluation strategies associate a plurality of rules with forms of changes to the plurality of information technology resources. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the method determines that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, the method evaluates the at least one of the plurality of rules and performs the operation of the at least one rule.Type: ApplicationFiled: April 30, 2012Publication date: August 23, 2012Applicant: International Business Machines CorporationInventors: Gerd Breiter, Dominik Jall, Markus Mueller, Alexander Neef, Martin Reitz
-
Publication number: 20110022560Abstract: A method includes maintaining descriptions of a plurality of information technology resources in a computer-readable storage medium. The method includes maintaining a plurality of evaluation strategies, wherein the evaluation strategies associate a plurality of rules with forms of changes to the plurality of information technology resources. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the method determines that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, the method evaluates the at least one of the plurality of rules and performs the operation of the at least one rule.Type: ApplicationFiled: June 30, 2010Publication date: January 27, 2011Applicant: International Business Machines CorporationInventors: Gerd Breiter, Dominik Jall, Markus Mueller, Alexander Neef, Martin Reitz