Patents by Inventor Anthony M. Hunt

Anthony M. Hunt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190243555
    Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.
    Type: Application
    Filed: April 19, 2019
    Publication date: August 8, 2019
    Inventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
  • Patent number: 10332018
    Abstract: A set of internal information technology (IT) architecture is received and the internal IT architecture is controlled by a service provider. A set of exogenous IT architecture is received and the exogenous IT architecture is not controlled by the service provider. A set of service level agreement (SLA) requirements, agreed upon by the service provider and a service user, are received. A set of sensor data, from sensors monitoring environmental conditions which may affect at least one of the internal IT architecture or the exogenous IT architecture, is received. A set of heuristic data relating to the internal IT architecture and the exogenous IT architecture is received. A risk metric based on the set of internal IT architecture, the set of exogenous IT architecture, the set of SLA requirements, the set of sensor data, and the set of heuristic data is determined.
    Type: Grant
    Filed: March 1, 2016
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventors: Richard M. Cocchiara, John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Clea A. Zolotow
  • Patent number: 10331383
    Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.
    Type: Grant
    Filed: June 24, 2016
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
  • Publication number: 20190183399
    Abstract: A computer-implemented method includes: receiving, by a computing device, information identifying a user's activity; determining, by the computing device, the user's tasks based on the information identifying the user's activity; determining, by the computing device, the user's context switches based on the user's tasks; receiving, by the computing device, biometrics data associated with the user via an application programming interface (API); determining, by the computing device, the user's stress levels at various times based on the biometrics data; storing, by the computing device, information linking the user's stress level with the user's context switches; and outputting, by the computing device, the information linking the user's stress level with the user's context switches.
    Type: Application
    Filed: February 25, 2019
    Publication date: June 20, 2019
    Inventors: John V. Delaney, Sean T. Fornash, Anthony M. Hunt, Maeve O'Reilly, Clea A. Zolotow
  • Publication number: 20190179677
    Abstract: A computer-implemented method includes: monitoring, by a computing device, resource usage data for a hypervisor; monitoring, by the computing device, resource usage data for a guest machine; identifying, by the computing device, outliers in the resource usage data for the hypervisor and outliers in the resource usage data for the guest machine; executing, by the computing device, a root cause model based on the resource usage data for the hypervisor and the resource usage data for the guest machine; generating, by the computing device, a root cause report identifying results of the executed root cause model; and providing, by the computing device, the root cause report for display.
    Type: Application
    Filed: February 19, 2019
    Publication date: June 13, 2019
    Inventors: John V. Delaney, Anthony M. Hunt, David O'Grady, Niamh Phelan, Claus Schroeder-Hansen, Clea A. Zolotow
  • Patent number: 10320689
    Abstract: Data migrations are not able to be identified or traced through a switched network to their originating hub, because the corresponding TCP/IP data stream goes through a plurality of optimized differential switches and the originating IP in the packet header gets replaced at each switch. The present invention provides a mechanism to introduce a lag or a jitter into the IP to label the migrated data. The labeled data are able to be traced and identified through multiple managed hubs and/or switches.
    Type: Grant
    Filed: May 24, 2016
    Date of Patent: June 11, 2019
    Assignee: International Business Machines Corporation
    Inventors: Andrew P. Barnes, John V. Delaney, Anthony M. Hunt, Claus Schrøder-Hansen, Clea A. Zolotow
  • Patent number: 10305814
    Abstract: A computer-implemented method sizes a Storage Area Network (SAN) storage migration. One or more processors determine Input/output Operations Per Second (IOPS) and throughput of hardware devices operatively coupled to a target Storage Area Network (SAN) prior to a SAN migration from a source SAN to the target SAN. One or more processors determine an estimated time and size of the SAN migration based on the IOPS and the throughput of the hardware devices. One or more processors then configure transmission resources available to the source SAN to comport with the estimated time and size of the SAN migration.
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: May 28, 2019
    Assignee: International Business Machines Corporation
    Inventors: Russell G. Conner, Anthony M. Hunt, Daniel P. Toulan, Johan van Kessel, Clea A. Zolotow
  • Patent number: 10261839
    Abstract: A computer-implemented method includes: monitoring, by a computing device, resource usage data for a hypervisor; monitoring, by the computing device, resource usage data for a guest machine; identifying, by the computing device, outliers in the resource usage data for the hypervisor and outliers in the resource usage data for the guest machine; executing, by the computing device, a root cause model based on the resource usage data for the hypervisor and the resource usage data for the guest machine; generating, by the computing device, a root cause report identifying results of the executed root cause model; and providing, by the computing device, the root cause report for display.
    Type: Grant
    Filed: November 2, 2016
    Date of Patent: April 16, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John V. Delaney, Anthony M. Hunt, David O'Grady, Niamh Phelan, Claus Schroeder-Hansen, Clea A. Zolotow
  • Patent number: 10258272
    Abstract: A computer-implemented method includes: receiving, by a computing device, information identifying a user's activity; determining, by the computing device, the user's tasks based on the information identifying the user's activity; determining, by the computing device, the user's context switches based on the user's tasks; receiving, by the computing device, biometrics data associated with the user via an application programming interface (API); determining, by the computing device, the user's stress levels at various times based on the biometrics data; storing, by the computing device, information linking the user's stress level with the user's context switches; and outputting, by the computing device, the information linking the user's stress level with the user's context switches.
    Type: Grant
    Filed: October 8, 2015
    Date of Patent: April 16, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John V. Delaney, Sean T. Fornash, Anthony M. Hunt, Maeve O'Reilly, Clea A. Zolotow
  • Patent number: 10203991
    Abstract: In a virtualized data processing system where an operating system assigns resources to a virtualized computing entity (VCE) according to a container configuration of the VCE, and by using performance data corresponding to a type of the VCE, an initial resource allocation for a new VCE is computed at an initialization of the new VCE. The performance data includes at least a processor utilization information corresponding to the type of VCE for a past period. An operation of the new VCE is initiated using the initial resource allocation. New performance data is collected from the operation of the new VCE. For a future period of operation of the new VCE, a resource requirement is forecasted. An instruction to a provisioning system is constructed, specifying a portion of the resource requirement and the future period, which causes the provisioning system to adjust the initial resource allocation.
    Type: Grant
    Filed: January 19, 2017
    Date of Patent: February 12, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Simon J. Brady, John V. Delaney, Anthony M. Hunt, Claus Schrøder-Hansen, Gerhard A. Widmayer, Clea Zolotow
  • Patent number: 10171301
    Abstract: A method and associated systems for identifying hardcoded network addresses. A network-migration tool requests from a network certain types of data that may identify IP addresses used by the network and receives a subset of the requested data. The system infers from the manner in which received data characterizes IP addresses which of those addresses are likely to be hardcoded. If the system receives a list of server affinities, it infers that an IP address used for communication between servers in a same affinity group is hardcoded if that address is not listed by an associated DNS server. If a received ARP cache lists an IP address as having been resolved to a MAC address, the system infers that the IP address cannot be hardcoded. If a received TCP trace log lists an address without a corresponding hostname the system infers that the address is hardcoded.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Anthony M. Hunt, Dennis A. Perpetua, Jr., Srinivasa Raghavan, Clea A. Zolotow
  • Publication number: 20180336051
    Abstract: A computer-implemented method includes: monitoring, by a computing device, computing resource utilization by a plurality of virtual computing components sharing a same kernel; monitoring, by the computing device, transaction counts produced by the plurality of virtual computing components; determining, by the computing device, that the transaction counts increase by less than a threshold number as the computing resource utilization increases; and creating, by the computing device, an additional virtual computing component on a separate kernel based on determining that the transaction counts increase by less than a threshold number as the computing resource utilization increases.
    Type: Application
    Filed: May 16, 2017
    Publication date: November 22, 2018
    Inventors: Andrew P. BARNES, John V. DELANEY, Florian D. GRAF, Anthony M. HUNT, Clea A. ZOLOTOW
  • Patent number: 10114460
    Abstract: A tactile device for virtual reality simulations includes an outer hollow sphere, a pliable inner hollow sphere, a plurality of actuators, and a framework. The plurality of actuators physically couple the outer hollow sphere to the pliable inner hollow sphere, and are configured to dynamically and physically reshape the pliable inner hollow sphere as the outer hollow sphere and the pliable inner hollow sphere rotate. The framework includes a plurality of powered rollers that support the outer hollow sphere and control a rotational speed and direction of the outer hollow sphere and the pliable inner hollow sphere.
    Type: Grant
    Filed: August 8, 2016
    Date of Patent: October 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: John V. Delaney, Sean T. Fornash, Anthony M. Hunt, Claus Schroeder-Hansen, Clea A. Zolotow
  • Publication number: 20180276018
    Abstract: A method for off-board data migration. Responsive to receiving a request to migrate a virtual machine image, a memory location of the source virtual machine is identified. Using a generalized pathing interface, a range of logical blocks is accessed for both the source and destination virtual machines. The memory location of the source virtual machine is copied to a memory location of the destination virtual machine. The destination virtual machine is started, and; and the source virtual machine is stopped.
    Type: Application
    Filed: March 21, 2017
    Publication date: September 27, 2018
    Inventors: John V. Delaney, Florian D. Graf, Anthony M. Hunt, Ricky L. Montagna, Pawel J. Wieczorek, Clea A. Zolotow
  • Publication number: 20180203739
    Abstract: In a virtualized data processing system where an operating system assigns resources to a virtualized computing entity (VCE) according to a container configuration of the VCE, and by using performance data corresponding to a type of the VCE, an initial resource allocation for a new VCE is computed at an initialization of the new VCE. The performance data includes at least a processor utilization information corresponding to the type of VCE for a past period. An operation of the new VCE is initiated using the initial resource allocation. New performance data is collected from the operation of the new VCE. For a future period of operation of the new VCE, a resource requirement is forecasted. An instruction to a provisioning system is constructed, specifying a portion of the resource requirement and the future period, which causes the provisioning system to adjust the initial resource allocation.
    Type: Application
    Filed: January 19, 2017
    Publication date: July 19, 2018
    Applicant: International Business Machines Corporation
    Inventors: Simon J. Brady, John V. Delaney, Anthony M. Hunt, Claus Schrøder-Hansen, Gerhard A. Widmayer, Clea Zolotow
  • Publication number: 20180121248
    Abstract: A computer-implemented method includes: monitoring, by a computing device, resource usage data for a hypervisor; monitoring, by the computing device, resource usage data for a guest machine; identifying, by the computing device, outliers in the resource usage data for the hypervisor and outliers in the resource usage data for the guest machine; executing, by the computing device, a root cause model based on the resource usage data for the hypervisor and the resource usage data for the guest machine; generating, by the computing device, a root cause report identifying results of the executed root cause model; and providing, by the computing device, the root cause report for display.
    Type: Application
    Filed: November 2, 2016
    Publication date: May 3, 2018
    Inventors: John V. Delaney, Anthony M. Hunt, David O'Grady, Niamh Phelan, Claus Schroeder-Hansen, Clea A. Zolotow
  • Publication number: 20180039330
    Abstract: A tactile device for virtual reality simulations includes an outer hollow sphere, a pliable inner hollow sphere, a plurality of actuators, and a framework. The plurality of actuators physically couple the outer hollow sphere to the pliable inner hollow sphere, and are configured to dynamically and physically reshape the pliable inner hollow sphere as the outer hollow sphere and the pliable inner hollow sphere rotate. The framework includes a plurality of powered rollers that support the outer hollow sphere and control a rotational speed and direction of the outer hollow sphere and the pliable inner hollow sphere.
    Type: Application
    Filed: August 8, 2016
    Publication date: February 8, 2018
    Inventors: JOHN V. DELANEY, SEAN T. FORNASH, ANTHONY M. HUNT, CLAUS SCHROEDER-HANSEN, CLEA A. ZOLOTOW
  • Publication number: 20180018107
    Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.
    Type: Application
    Filed: October 9, 2017
    Publication date: January 18, 2018
    Inventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
  • Publication number: 20170371562
    Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.
    Type: Application
    Filed: June 24, 2016
    Publication date: December 28, 2017
    Inventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
  • Publication number: 20170366574
    Abstract: A set of internal information technology (IT) architecture is received and the internal IT architecture is controlled by a service provider. A set of exogenous IT architecture is received and the exogenous IT architecture is not controlled by the service provider. A set of service level agreement (SLA) requirements, agreed upon by the service provider and a service user, are received. A set of sensor data, from sensors monitoring environmental conditions which may affect at least one of the internal IT architecture or the exogenous IT architecture, is received. A set of heuristic data relating to the internal IT architecture and the exogenous IT architecture is received. A risk metric based on the set of internal IT architecture, the set of exogenous IT architecture, the set of SLA requirements, the set of sensor data, and the set of heuristic data is determined.
    Type: Application
    Filed: September 8, 2017
    Publication date: December 21, 2017
    Inventors: Richard M. Cocchiara, John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Clea A. Zolotow