Patents by Inventor Andrew T. Thorstensen

Andrew T. Thorstensen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160092253
    Abstract: A host-side overcommit value is set upon a physical node that implements virtual machines (VM Node). The overcommit value is determined by receiving a selected enablement template that includes a selected computing capacity and a selected overcommit value. A user-side normalization factor is determined that normalizes the selected computing capacity against a reference data handling system. A comparable computing capacity of the VM Node is determined. A host-side normalization factor is determined that normalizes the comparable computing capacity against the reference data handling system. The host-side overcommit value is determined from the selected overcommit value, the user-side normalization factor, and the host-side normalization factor. The host-side overcommit value may indicate the degree the comparable computing capacity is overcommitted to virtual machines deployed upon heterogeneous VM Nodes as normalized against the reference system.
    Type: Application
    Filed: September 25, 2014
    Publication date: March 31, 2016
    Inventors: Susan F. Crowell, Jason A. Nikolai, Andrew T. Thorstensen
  • Publication number: 20150334039
    Abstract: Systems, methods, and computer program products to perform an operation, by, responsive to a request specifying to transition a state of a virtual machine in a cloud computing environment from a first state to a second state, allocating one or more system resources to the virtual machine during the transition from the first state to the second state, and, upon completion of the transition, releasing a portion of the allocated one or more system resources to a pool of available resources, so that the virtual machine is left with a remaining portion of the allocated one or more resources sufficient for operation during the second state.
    Type: Application
    Filed: May 13, 2014
    Publication date: November 19, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susan F. CROWELL, Jason A. NIKOLAI, Andrew T. THORSTENSEN
  • Publication number: 20150334040
    Abstract: Method to perform an operation, by, responsive to a request specifying to transition a state of a virtual machine in a cloud computing environment from a first state to a second state, allocating one or more system resources to the virtual machine during the transition from the first state to the second state, and, upon completion of the transition, releasing a portion of the allocated one or more system resources to a pool of available resources, so that the virtual machine is left with a remaining portion of the allocated one or more resources sufficient for operation during the second state.
    Type: Application
    Filed: September 9, 2014
    Publication date: November 19, 2015
    Inventors: Susan F. CROWELL, Jason A. NIKOLAI, Andrew T. THORSTENSEN
  • Publication number: 20150295789
    Abstract: A method, a system, and a computer program product for managing the resources of a virtual machine on a physical server are provided. The method includes receiving, at a management application, a request to increase a first virtual resource from an initial level to an increased level for a first virtual machine. The first virtual machine is provided by a first physical server in a computing environment. The method also includes determining whether a free virtual resource for the first physical server is sufficient for the request at the increased level. The method also includes increasing, in response to the free virtual resource being insufficient for the request, the first virtual resource.
    Type: Application
    Filed: April 9, 2014
    Publication date: October 15, 2015
    Applicant: International Business Machines Corporation
    Inventors: Joseph W. Cropper, Susan F. Crowell, Jason A. Nikolai, Andrew T. Thorstensen
  • Publication number: 20150295791
    Abstract: A method, a system, and a computer program product for managing the resources of a virtual machine on a physical server are provided. The method includes receiving, at a management application, a request to increase a first virtual resource from an initial level to an increased level for a first virtual machine. The first virtual machine is provided by a first physical server in a computing environment. The method also includes determining whether a free virtual resource for the first physical server is sufficient for the request at the increased level. The method also includes increasing, in response to the free virtual resource being insufficient for the request, the first virtual resource.
    Type: Application
    Filed: May 8, 2014
    Publication date: October 15, 2015
    Applicant: International Business Machines Corporation
    Inventors: Joseph W. Cropper, Susan F. Crowell, Jason A. Nikolai, Andrew T. Thorstensen
  • Publication number: 20150295790
    Abstract: Embodiments of the present disclosure call for a method, a system, and a computer program product for managing virtual resources for a virtual machine of interest on a physical server. The method includes monitoring a plurality of physical servers, on a computing system. Each physical server provides an initial level of virtual resources to a plurality of virtual machines. The method also includes receiving a requested level of virtual resources for a virtual machine of interest hosted by a first physical server from the plurality of physical servers. The method also includes determining whether the first physical server is able to host the requested level of virtual resources for the virtual machine of interest. The method also includes determining, in response to the first physical server not being able to host the requested level of resources for the virtual machine of interest, a path.
    Type: Application
    Filed: April 9, 2014
    Publication date: October 15, 2015
    Applicant: International Business Machines Corporation
    Inventors: Joseph W. Cropper, Susan F. Crowell, Jason A. Nikolai, Andrew T. Thorstensen
  • Publication number: 20150295792
    Abstract: Embodiments of the present disclosure call for a method, a system, and a computer program product for managing virtual resources for a virtual machine of interest on a physical server. The method includes monitoring a plurality of physical servers, on a computing system. Each physical server provides an initial level of virtual resources to a plurality of virtual machines. The method also includes receiving a requested level of virtual resources for a virtual machine of interest hosted by a first physical server from the plurality of physical servers. The method also includes determining whether the first physical server is able to host the requested level of virtual resources for the virtual machine of interest. The method also includes determining, in response to the first physical server not being able to host the requested level of resources for the virtual machine of interest, a path.
    Type: Application
    Filed: May 8, 2014
    Publication date: October 15, 2015
    Applicant: International Business Machines Corporation
    Inventors: Joseph W. Cropper, Susan F. Crowell, Jason A. Nikolai, Andrew T. Thorstensen
  • Publication number: 20150127830
    Abstract: Methods for managing an address on a switching device, managing an address on a network switch, and screening addresses in a cloud computing environment are provided. One embodiment is directed towards a computer-implemented method for managing an address on a switching device that is communicatively coupled to a plurality of virtual machines. The method includes accessing an address pool that includes an assigned address for each virtual machine from the plurality of virtual machines. The method includes determining, on the switching device, a used address for the virtual machine from the plurality of virtual machines. The method includes determining whether the used address is matching the assigned address for each virtual machine. The method also includes routing traffic from the virtual machine to a hypervisor in response to the used address matching the assigned address.
    Type: Application
    Filed: December 20, 2013
    Publication date: May 7, 2015
    Applicant: International Business Machines Corporation
    Inventors: Deanna L.Q. Brown, Susan F. Crowell, Jason A. Nikolai, Andrew T. Thorstensen
  • Publication number: 20150128245
    Abstract: Methods for managing an address on a switching device, managing an address on a network switch, and screening addresses in a cloud computing environment are provided. One embodiment is directed towards a computer-implemented method for managing an address on a switching device that is communicatively coupled to a plurality of virtual machines. The method includes accessing an address pool that includes an assigned address for each virtual machine from the plurality of virtual machines. The method includes determining, on the switching device, a used address for the virtual machine from the plurality of virtual machines. The method includes determining whether the used address is matching the assigned address for each virtual machine. The method also includes routing traffic from the virtual machine to a hypervisor in response to the used address matching the assigned address.
    Type: Application
    Filed: November 7, 2013
    Publication date: May 7, 2015
    Applicant: International Business Machines Corporation
    Inventors: Deanna L.Q. Brown, Susan F. Crowell, Jason A. Nikolai, Andrew T. Thorstensen
  • Publication number: 20150100487
    Abstract: System, method, and computer program product to implement four factor authentication rule-based intelligent bank cards, by receiving valid authentication information for a card associated with an account, verifying that a captured image of a person presenting the card matches an image of an authorized user of the account, analyzing the captured image to detect an emotion of the person, and performing a predefined operation to control access to the account upon determining that the detected emotion satisfies an emotion rule associated with the account.
    Type: Application
    Filed: December 12, 2014
    Publication date: April 9, 2015
    Inventors: Susan F. Crowell, Jason A. Nikolai, Andrew T. Thorstensen
  • Publication number: 20150066764
    Abstract: System, method, and computer program product to implement four factor authentication rule-based intelligent bank cards, by receiving valid authentication information for a card associated with an account, verifying that a captured image of a person presenting the card matches an image of an authorized user of the account, analyzing the captured image to detect an emotion of the person, and performing a predefined operation to control access to the account upon determining that the detected emotion satisfies an emotion rule associated with the account.
    Type: Application
    Filed: September 5, 2013
    Publication date: March 5, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susan F. Crowell, Jason A. Nikolai, Andrew T. Thorstensen
  • Publication number: 20150052614
    Abstract: Techniques are disclosed for virtual machine trust isolation in an Infrastructure-as-a-Service (IaaS) cloud environment. More specifically, embodiments of the invention monitor levels of suspicious activity on a particular virtual machine using node agents embedded in each physical node. The node agents transmit activity data to a security and relocation engine. If a virtual machine's suspicious activity levels exceed defined suspicious activity thresholds, the security and relocation engine assigns that virtual machine to a different zone. The zones may have reduced connectivity and/or service levels. This enables administrators to more efficiently respond to security threats in the cloud environment.
    Type: Application
    Filed: August 19, 2013
    Publication date: February 19, 2015
    Applicant: International Business Machines Corporation
    Inventors: Susan F. Crowell, Jason A. Nikolai, Andrew T. Thorstensen
  • Publication number: 20150052520
    Abstract: Techniques are disclosed for virtual machine trust isolation in an Infrastructure-as-a-Service (IaaS) cloud environment. More specifically, embodiments of the invention monitor levels of suspicious activity on a particular virtual machine using node agents embedded in each physical node. The node agents transmit activity data to a security and relocation engine. If a virtual machine's suspicious activity levels exceed defined suspicious activity thresholds, the security and relocation engine assigns that virtual machine to a different zone. The zones may have reduced connectivity and/or service levels. This enables administrators to more efficiently respond to security threats in the cloud environment.
    Type: Application
    Filed: October 18, 2013
    Publication date: February 19, 2015
    Applicant: International Business Machines Corporation
    Inventors: Susan F. CROWELL, Jason A. NIKOLAI, Andrew T. THORSTENSEN
  • Publication number: 20140164594
    Abstract: A method for recommending placement of virtual servers within a virtualized environment. The method includes collecting information relating to a plurality of virtual servers and to a plurality of host computing systems, wherein one or more of the plurality of host computing systems hosts at least one of the plurality of virtual servers. The method includes measuring efficiency of at least one of the plurality of virtual servers on a current host computing system within the virtualized environment. The method includes determining the efficiency of the at least one virtual server will be improved with the at least one virtual server on a second host computing system and, in response to determining the efficiency will be improved, recommending placement of the at least one virtual server on the second host computing system.
    Type: Application
    Filed: December 11, 2012
    Publication date: June 12, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susan F. Crowell, Jason A. Nikolai, Andrew T. Thorstensen
  • Publication number: 20090180444
    Abstract: A mobile wireless device connects to a network of multiple wireless transceiver stations using a protocol in which a connection is established with a particular transceiver station. If the mobile device moves out of range of the original station, the connection is passed to another station, which then impersonates the original station, without dropping the connection. Preferably, the original station provides a virtual Media Access Control (MAC) address to identify itself when the connection is established, and this virtual MAC address is passed to any successor station. Preferably, the station monitors signal strength and automatically passes the connection by polling its neighbors upon determining that signal strength is getting weak.
    Type: Application
    Filed: January 15, 2008
    Publication date: July 16, 2009
    Inventors: Brian D. McManus, Andrew T. Thorstensen