Patents by Inventor Anthony M. Hunt
Anthony M. Hunt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190243555Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.Type: ApplicationFiled: April 19, 2019Publication date: August 8, 2019Inventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
-
Patent number: 10332018Abstract: A set of internal information technology (IT) architecture is received and the internal IT architecture is controlled by a service provider. A set of exogenous IT architecture is received and the exogenous IT architecture is not controlled by the service provider. A set of service level agreement (SLA) requirements, agreed upon by the service provider and a service user, are received. A set of sensor data, from sensors monitoring environmental conditions which may affect at least one of the internal IT architecture or the exogenous IT architecture, is received. A set of heuristic data relating to the internal IT architecture and the exogenous IT architecture is received. A risk metric based on the set of internal IT architecture, the set of exogenous IT architecture, the set of SLA requirements, the set of sensor data, and the set of heuristic data is determined.Type: GrantFiled: March 1, 2016Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: Richard M. Cocchiara, John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Clea A. Zolotow
-
Patent number: 10331383Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.Type: GrantFiled: June 24, 2016Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
-
Publication number: 20190183399Abstract: A computer-implemented method includes: receiving, by a computing device, information identifying a user's activity; determining, by the computing device, the user's tasks based on the information identifying the user's activity; determining, by the computing device, the user's context switches based on the user's tasks; receiving, by the computing device, biometrics data associated with the user via an application programming interface (API); determining, by the computing device, the user's stress levels at various times based on the biometrics data; storing, by the computing device, information linking the user's stress level with the user's context switches; and outputting, by the computing device, the information linking the user's stress level with the user's context switches.Type: ApplicationFiled: February 25, 2019Publication date: June 20, 2019Inventors: John V. Delaney, Sean T. Fornash, Anthony M. Hunt, Maeve O'Reilly, Clea A. Zolotow
-
Publication number: 20190179677Abstract: A computer-implemented method includes: monitoring, by a computing device, resource usage data for a hypervisor; monitoring, by the computing device, resource usage data for a guest machine; identifying, by the computing device, outliers in the resource usage data for the hypervisor and outliers in the resource usage data for the guest machine; executing, by the computing device, a root cause model based on the resource usage data for the hypervisor and the resource usage data for the guest machine; generating, by the computing device, a root cause report identifying results of the executed root cause model; and providing, by the computing device, the root cause report for display.Type: ApplicationFiled: February 19, 2019Publication date: June 13, 2019Inventors: John V. Delaney, Anthony M. Hunt, David O'Grady, Niamh Phelan, Claus Schroeder-Hansen, Clea A. Zolotow
-
Patent number: 10320689Abstract: Data migrations are not able to be identified or traced through a switched network to their originating hub, because the corresponding TCP/IP data stream goes through a plurality of optimized differential switches and the originating IP in the packet header gets replaced at each switch. The present invention provides a mechanism to introduce a lag or a jitter into the IP to label the migrated data. The labeled data are able to be traced and identified through multiple managed hubs and/or switches.Type: GrantFiled: May 24, 2016Date of Patent: June 11, 2019Assignee: International Business Machines CorporationInventors: Andrew P. Barnes, John V. Delaney, Anthony M. Hunt, Claus Schrøder-Hansen, Clea A. Zolotow
-
Patent number: 10305814Abstract: A computer-implemented method sizes a Storage Area Network (SAN) storage migration. One or more processors determine Input/output Operations Per Second (IOPS) and throughput of hardware devices operatively coupled to a target Storage Area Network (SAN) prior to a SAN migration from a source SAN to the target SAN. One or more processors determine an estimated time and size of the SAN migration based on the IOPS and the throughput of the hardware devices. One or more processors then configure transmission resources available to the source SAN to comport with the estimated time and size of the SAN migration.Type: GrantFiled: August 5, 2015Date of Patent: May 28, 2019Assignee: International Business Machines CorporationInventors: Russell G. Conner, Anthony M. Hunt, Daniel P. Toulan, Johan van Kessel, Clea A. Zolotow
-
Patent number: 10261839Abstract: A computer-implemented method includes: monitoring, by a computing device, resource usage data for a hypervisor; monitoring, by the computing device, resource usage data for a guest machine; identifying, by the computing device, outliers in the resource usage data for the hypervisor and outliers in the resource usage data for the guest machine; executing, by the computing device, a root cause model based on the resource usage data for the hypervisor and the resource usage data for the guest machine; generating, by the computing device, a root cause report identifying results of the executed root cause model; and providing, by the computing device, the root cause report for display.Type: GrantFiled: November 2, 2016Date of Patent: April 16, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John V. Delaney, Anthony M. Hunt, David O'Grady, Niamh Phelan, Claus Schroeder-Hansen, Clea A. Zolotow
-
Patent number: 10258272Abstract: A computer-implemented method includes: receiving, by a computing device, information identifying a user's activity; determining, by the computing device, the user's tasks based on the information identifying the user's activity; determining, by the computing device, the user's context switches based on the user's tasks; receiving, by the computing device, biometrics data associated with the user via an application programming interface (API); determining, by the computing device, the user's stress levels at various times based on the biometrics data; storing, by the computing device, information linking the user's stress level with the user's context switches; and outputting, by the computing device, the information linking the user's stress level with the user's context switches.Type: GrantFiled: October 8, 2015Date of Patent: April 16, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John V. Delaney, Sean T. Fornash, Anthony M. Hunt, Maeve O'Reilly, Clea A. Zolotow
-
Patent number: 10203991Abstract: In a virtualized data processing system where an operating system assigns resources to a virtualized computing entity (VCE) according to a container configuration of the VCE, and by using performance data corresponding to a type of the VCE, an initial resource allocation for a new VCE is computed at an initialization of the new VCE. The performance data includes at least a processor utilization information corresponding to the type of VCE for a past period. An operation of the new VCE is initiated using the initial resource allocation. New performance data is collected from the operation of the new VCE. For a future period of operation of the new VCE, a resource requirement is forecasted. An instruction to a provisioning system is constructed, specifying a portion of the resource requirement and the future period, which causes the provisioning system to adjust the initial resource allocation.Type: GrantFiled: January 19, 2017Date of Patent: February 12, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Simon J. Brady, John V. Delaney, Anthony M. Hunt, Claus Schrøder-Hansen, Gerhard A. Widmayer, Clea Zolotow
-
Patent number: 10171301Abstract: A method and associated systems for identifying hardcoded network addresses. A network-migration tool requests from a network certain types of data that may identify IP addresses used by the network and receives a subset of the requested data. The system infers from the manner in which received data characterizes IP addresses which of those addresses are likely to be hardcoded. If the system receives a list of server affinities, it infers that an IP address used for communication between servers in a same affinity group is hardcoded if that address is not listed by an associated DNS server. If a received ARP cache lists an IP address as having been resolved to a MAC address, the system infers that the IP address cannot be hardcoded. If a received TCP trace log lists an address without a corresponding hostname the system infers that the address is hardcoded.Type: GrantFiled: July 27, 2015Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Anthony M. Hunt, Dennis A. Perpetua, Jr., Srinivasa Raghavan, Clea A. Zolotow
-
Publication number: 20180336051Abstract: A computer-implemented method includes: monitoring, by a computing device, computing resource utilization by a plurality of virtual computing components sharing a same kernel; monitoring, by the computing device, transaction counts produced by the plurality of virtual computing components; determining, by the computing device, that the transaction counts increase by less than a threshold number as the computing resource utilization increases; and creating, by the computing device, an additional virtual computing component on a separate kernel based on determining that the transaction counts increase by less than a threshold number as the computing resource utilization increases.Type: ApplicationFiled: May 16, 2017Publication date: November 22, 2018Inventors: Andrew P. BARNES, John V. DELANEY, Florian D. GRAF, Anthony M. HUNT, Clea A. ZOLOTOW
-
Patent number: 10114460Abstract: A tactile device for virtual reality simulations includes an outer hollow sphere, a pliable inner hollow sphere, a plurality of actuators, and a framework. The plurality of actuators physically couple the outer hollow sphere to the pliable inner hollow sphere, and are configured to dynamically and physically reshape the pliable inner hollow sphere as the outer hollow sphere and the pliable inner hollow sphere rotate. The framework includes a plurality of powered rollers that support the outer hollow sphere and control a rotational speed and direction of the outer hollow sphere and the pliable inner hollow sphere.Type: GrantFiled: August 8, 2016Date of Patent: October 30, 2018Assignee: International Business Machines CorporationInventors: John V. Delaney, Sean T. Fornash, Anthony M. Hunt, Claus Schroeder-Hansen, Clea A. Zolotow
-
Publication number: 20180276018Abstract: A method for off-board data migration. Responsive to receiving a request to migrate a virtual machine image, a memory location of the source virtual machine is identified. Using a generalized pathing interface, a range of logical blocks is accessed for both the source and destination virtual machines. The memory location of the source virtual machine is copied to a memory location of the destination virtual machine. The destination virtual machine is started, and; and the source virtual machine is stopped.Type: ApplicationFiled: March 21, 2017Publication date: September 27, 2018Inventors: John V. Delaney, Florian D. Graf, Anthony M. Hunt, Ricky L. Montagna, Pawel J. Wieczorek, Clea A. Zolotow
-
Publication number: 20180203739Abstract: In a virtualized data processing system where an operating system assigns resources to a virtualized computing entity (VCE) according to a container configuration of the VCE, and by using performance data corresponding to a type of the VCE, an initial resource allocation for a new VCE is computed at an initialization of the new VCE. The performance data includes at least a processor utilization information corresponding to the type of VCE for a past period. An operation of the new VCE is initiated using the initial resource allocation. New performance data is collected from the operation of the new VCE. For a future period of operation of the new VCE, a resource requirement is forecasted. An instruction to a provisioning system is constructed, specifying a portion of the resource requirement and the future period, which causes the provisioning system to adjust the initial resource allocation.Type: ApplicationFiled: January 19, 2017Publication date: July 19, 2018Applicant: International Business Machines CorporationInventors: Simon J. Brady, John V. Delaney, Anthony M. Hunt, Claus Schrøder-Hansen, Gerhard A. Widmayer, Clea Zolotow
-
Publication number: 20180121248Abstract: A computer-implemented method includes: monitoring, by a computing device, resource usage data for a hypervisor; monitoring, by the computing device, resource usage data for a guest machine; identifying, by the computing device, outliers in the resource usage data for the hypervisor and outliers in the resource usage data for the guest machine; executing, by the computing device, a root cause model based on the resource usage data for the hypervisor and the resource usage data for the guest machine; generating, by the computing device, a root cause report identifying results of the executed root cause model; and providing, by the computing device, the root cause report for display.Type: ApplicationFiled: November 2, 2016Publication date: May 3, 2018Inventors: John V. Delaney, Anthony M. Hunt, David O'Grady, Niamh Phelan, Claus Schroeder-Hansen, Clea A. Zolotow
-
Publication number: 20180039330Abstract: A tactile device for virtual reality simulations includes an outer hollow sphere, a pliable inner hollow sphere, a plurality of actuators, and a framework. The plurality of actuators physically couple the outer hollow sphere to the pliable inner hollow sphere, and are configured to dynamically and physically reshape the pliable inner hollow sphere as the outer hollow sphere and the pliable inner hollow sphere rotate. The framework includes a plurality of powered rollers that support the outer hollow sphere and control a rotational speed and direction of the outer hollow sphere and the pliable inner hollow sphere.Type: ApplicationFiled: August 8, 2016Publication date: February 8, 2018Inventors: JOHN V. DELANEY, SEAN T. FORNASH, ANTHONY M. HUNT, CLAUS SCHROEDER-HANSEN, CLEA A. ZOLOTOW
-
Publication number: 20180018107Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.Type: ApplicationFiled: October 9, 2017Publication date: January 18, 2018Inventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
-
Publication number: 20170371562Abstract: A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. The storage migration has a storage migration rate associated therewith. The method includes identifying an input/output throughput. The input/output throughput is associated with the storage area network. The input/output throughput stores a throughput rate for the storage area network. The method includes identifying a service level agreement rate for the input/output throughput. The method includes identifying a non-essential workload. The non-essential workload stores a non-essential workload rate associated therewith. The non-essential workload includes that portion of said input/output throughput that is for one or more background processes. The method includes determining an analyzed rate based on the throughput rate, the service level agreement rate, and the non-essential workload rate.Type: ApplicationFiled: June 24, 2016Publication date: December 28, 2017Inventors: John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Daniel P. Toulan, Clea A. Zolotow
-
Publication number: 20170366574Abstract: A set of internal information technology (IT) architecture is received and the internal IT architecture is controlled by a service provider. A set of exogenous IT architecture is received and the exogenous IT architecture is not controlled by the service provider. A set of service level agreement (SLA) requirements, agreed upon by the service provider and a service user, are received. A set of sensor data, from sensors monitoring environmental conditions which may affect at least one of the internal IT architecture or the exogenous IT architecture, is received. A set of heuristic data relating to the internal IT architecture and the exogenous IT architecture is received. A risk metric based on the set of internal IT architecture, the set of exogenous IT architecture, the set of SLA requirements, the set of sensor data, and the set of heuristic data is determined.Type: ApplicationFiled: September 8, 2017Publication date: December 21, 2017Inventors: Richard M. Cocchiara, John V. Delaney, Anthony M. Hunt, Maeve M. O'Reilly, Clea A. Zolotow