Patents by Inventor Bill Hilf

Bill Hilf has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080104578
    Abstract: A method for supporting an application can include the step of receiving a problem indication relating to the application. The method can also identify a host within a grid environment, wherein a host can be a software object used by said application. A ghost agent can be associated with the host. The actions of the host can be replicated for use by the ghost agent. Data relating to the replicated actions can be recorded using the ghost agent. The indicated problem can be responded to, where the response can be based at least in part upon the recorded data.
    Type: Application
    Filed: December 24, 2007
    Publication date: May 1, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20050130651
    Abstract: Within a mobile communications device, a method of roaming between a mobile network and a wireless network can include establishing a Voice-Over Internet Protocol communications link with an endpoint over which a call is conducted, wherein at least a portion of the call is conducted over the wireless network. The method further can include initiating a handoff of at least a portion of the call from the wireless network to the mobile network using a Session Initiation Protocol refer method and continuing the call using the mobile network for at least a portion of the call rather than the wireless network.
    Type: Application
    Filed: December 15, 2003
    Publication date: June 16, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050132075
    Abstract: A method of authenticating a mobile communication device can include forming a Session Initiation Protocol referred by token using authentication data provided by a mobile service provider over a mobile communications link and sending the token to a Session Initiation Protocol server via a wireless network. The Session Initiation Protocol server can send a request for validation, built using the token, to the mobile service provider using Parlay. A reply from the Session Initiation Protocol server can be received over the wireless network, wherein the reply indicates whether the request for validation from the Session Initiation Protocol server was confirmed.
    Type: Application
    Filed: December 15, 2003
    Publication date: June 16, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050132056
    Abstract: A method of sharing instant messaging transcripts can include establishing an instant messaging session. The method can also include receiving a user request to publish a transcript of the session to a Weblog and publishing the transcript to the Weblog.
    Type: Application
    Filed: December 15, 2003
    Publication date: June 16, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Craig Swearingen
  • Publication number: 20050076191
    Abstract: A method for gathering operational metrics can include the step of identifying a host within a grid environment, wherein the host can be a software object. A ghost agent can be associated with the host. The ghost agent can replicate actions of the host. Operational metrics for at least a portion of the replicated actions can be determined. The operational metrics can be recorded. The host can move within the grid environment. The ghost agent can responsively move in accordance with movement of the host.
    Type: Application
    Filed: September 19, 2003
    Publication date: April 7, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050076103
    Abstract: A method, system and machine readable storage for creating user groups in a network environment. The method includes the step of monitoring a plurality of user sessions, each associated with a different user. At least one affinity among the user sessions can be identified. Responsive to the affinity identification, at least one action can be initiated, for example, presenting a user interface to at least one of the users and/or prompting users to engage in communication.
    Type: Application
    Filed: September 22, 2003
    Publication date: April 7, 2005
    Applicant: International Business Machines Corporation
    Inventors: Bill Hilf, Neil Katz
  • Publication number: 20050076192
    Abstract: A testing method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host. The actions of the host can be replicated within the ghost agent. At least one test routine can be loaded into the ghost agent. The test routine can be executed within the ghost agent. Moreover, the executing step can utilize data gathered from the replicated actions. Test output can be generated from the test routine.
    Type: Application
    Filed: September 19, 2003
    Publication date: April 7, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Michael Mirt
  • Publication number: 20050073864
    Abstract: A method for evaluating system behavior within a grid environment can include the step of identifying a host software object, wherein the host software object includes a user object, an application, and/or a process. The software object can be associated with the host software object. The host actions of the host software object can be replicated within the associated software object. Replicated actions can be recorded. The host software object can move from one grid within the grid environment to a different grid. In response to the moving of the host software object, the associated software object can move from the one grid to the different grid.
    Type: Application
    Filed: September 19, 2003
    Publication date: April 7, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050066025
    Abstract: A method for evaluating system behavior of an application domain within a grid environment can include the step of identifying a host software object within the application domain. A software object can be associated with the host software object. Within the associated software object, host actions can be replicated. Replicated actions can be recorded. The host software object can move from one grid within the grid environment to a different grid. The associated software object can responsively move within the grid environment in accordance with movement of the host software object.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050065766
    Abstract: A testing method including the step of identifying multiple hosts located within multiple grids of a grid environment, wherein each host is a software object. A ghost agent can be associated with each identified host. Actions of the host can be replicated within each ghost agent. Data relating to the replicated actions can be recorded. Test input can be generated from the recorded data. Tests can be conducted within the grid environment using the test input.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050066309
    Abstract: A validation method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host, where the ghost agent can move within the grid environment. The actions of the host can be replicated by the ghost agent. Data related to the replicated actions can be compared with validation data. Validation output can be generated based upon the comparison.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Michael Mirt
  • Publication number: 20050065992
    Abstract: One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20050065994
    Abstract: A method for restricting resources consumed by a ghost agent can include the step of registering a ghost agent within a domain. The ghost agent can move across domains of a grid environment responsive to movements of an associated host. Once registered, a containment policy for the domain can be received by the ghost agent. The ghost agent can be configured according to the received containment policy. The containment policy can be utilized to restrict resources that are available to the ghost agent.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20050065803
    Abstract: A method for supporting an application can include the step of receiving a problem indication relating to the application. The method can also identify a host within a grid environment, wherein a host can be a software object used by said application. A ghost agent can be associated with the host. The actions of the host can be replicated for use by the ghost agent. Data relating to the replicated actions can be recorded using the ghost agent. The indicated problem can be responded to, where the response can be based at least in part upon the recorded data.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor Moore
  • Publication number: 20050066310
    Abstract: A method for debugging software objects within a grid environment including the step identifying a host, wherein the host is a software object. A ghost agent can be associated with the host. The ghost agent can replicate actions executed by the host. The host can be debugged based upon the replicated actions. The ghost agent can move from one grid within the grid environment to another grid.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050050138
    Abstract: A method for serving applications including receiving a component status publication and acquiring a client request. The component status publication can specify a usage level for an application component. A server response for the client request can be selected from among a multitude of possible server responses based at least in part upon the component status publication. Each possible server response can differentially utilize application components. The client request can be response to by conveying the selected server response.
    Type: Application
    Filed: September 3, 2003
    Publication date: March 3, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore
  • Publication number: 20050050139
    Abstract: A method of handling requests can include the step of handling requests with a handler. An overload condition can be detected for said handler. Requests can be directed to an alternative handler. A return timer can be initialized. When the return timer exceeds a time threshold for the alternative handler, requests can be routed to the handler. The time threshold can be automatically adjusted based upon a time in which the handler handles requests.
    Type: Application
    Filed: September 3, 2003
    Publication date: March 3, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Creamer, Bill Hilf, Neil Katz, Victor Moore