Patents by Inventor Christopher V. DeRobertis
Christopher V. DeRobertis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160218970Abstract: A method for routing data in a complex Storage Area Network (SAN) by a processor device is provided, and comprises in exchange based routing, reserving certain predefined Inter-Switch Links (ISLs) for use in routing certain predefined input/output (I/O) traffic across the SAN, such that the routing of other input/output (I/O) traffic remains unaffected and unchanged, the predefined input/output (I/O) traffic being subject to a specified path.Type: ApplicationFiled: January 26, 2015Publication date: July 28, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara ASTIGARRAGA, Christopher V. DEROBERTIS, Louie A. DICKENS, Jose Roberto MOSQUEDA MEJIA, Daniel J. WINARSKI
-
Publication number: 20160218914Abstract: Methods, computer systems, and computer program products for improving resiliency in a network of computing components functioning according to a multilayered Open Systems Interconnection (OSI) model include, upon exceeding a predetermined threshold for at least one of the multiple layers in the OSI model, for a certain event, a real-time notification of the event is provided in an inter-layer basis such that the responsible entity manages the event according to an OSI model-wide system.Type: ApplicationFiled: January 26, 2015Publication date: July 28, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara ASTIGARRAGA, Christopher V. DEROBERTIS, Louie A. DICKENS, Daniel J. WINARSKI
-
Publication number: 20160203039Abstract: Various embodiments for regulating link speed for performance enhancement and port diagnosis are provided. In response to identifying an amount of errors in a communications link above a predetermined threshold, an applicable transmission speed is selectively reduced. If errors identified at the reduced transmission speed are found to decrease, a communications port incorporating the communications link is flagged as potentially dirty, and if the errors identified at the reduced transmission speed are found to remain constant, the communications port is flagged as potentially bad.Type: ApplicationFiled: March 21, 2016Publication date: July 14, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara ASTIGARRAGA, Christopher V. DEROBERTIS, Louie A. DICKENS, Michael E. STARLING, Daniel J. WINARSKI
-
Publication number: 20160196366Abstract: A SAN testing application may be provided to restrict the utilization of one or more SAN device resources. The restricted, or throttled, resource(s) enables a smaller load to stress a SAN switch to effectively emulate a larger load. Resource throttling may, for example, result in the rapid filling of switch buffers and corresponding computational stress. The emulated load allows for all ports of a SAN switch to be simultaneously tested without the need or expense of a large number computing devices stressing the SAN. The SAN device with throttled resource(s) may be located within a testing environment or may be located in a functioning SAN to determine SAN bottlenecks prior to critical loading.Type: ApplicationFiled: January 6, 2015Publication date: July 7, 2016Inventors: Tara Astigarraga, Christopher V. DeRobertis, Louie A. Dickens, Michael E. Starling, Daniel J. Winarski
-
Patent number: 9298579Abstract: Various embodiments for regulating link speed for performance enhancement and port diagnosis are provided. In response to identifying an amount of errors in a communications link above a predetermined threshold, an applicable transmission speed is selectively reduced. The selective reduction occurs upon one of a temporary, permanent, and user-defined basis, and the selective reduction is performed using one of a manual setting adjustment and speed negotiation logic applied to the communications link. If errors identified at the reduced transmission speed are found to decrease, a communications port incorporating the communications link is flagged as potentially dirty, and if the errors identified at the reduced transmission speed are found to remain constant, the communications port is flagged as potentially bad.Type: GrantFiled: May 15, 2014Date of Patent: March 29, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara Astigarraga, Christopher V. Derobertis, Louie A. Dickens, Michael E. Starling, Daniel J. Winarski
-
Patent number: 9294944Abstract: A method and system for monitoring and analyzing flow control of packets in a communications network which includes multiple data transmission paths. The communications network has a first data path including an initiating node and a target node. A test frame is generated by an initiator module of a program executed by a computer for transmission over the first data path. The initiator module transmits the test frame over the first data path from the initiating node to the target node, wherein the test frame records a starting timestamp recorded by the initiating node upon transmitting the test frame. The test frame records a half trip timestamp recorded by the target node upon the test frame being received by the target node. The test frame records an end timestamp recorded by the initiating node, upon the test frame being received at the initiating node from the target node.Type: GrantFiled: December 21, 2012Date of Patent: March 22, 2016Assignee: International Business Machines CorporationInventors: Tara Astigarraga, Michael E. Browne, Christopher V. DeRobertis, Louie Arthur Dickens, Nancy J. Finn
-
Patent number: 9251382Abstract: A data processing system having a host computer including a key manager, a control unit connected to the host computer, a data storage unit (such as a tape drive) controlled by the control unit, and data storage medium for storing data thereon to be written to or read from by the data storage unit. The key manager stores a data structure having at least one record having a volume serial number, as start location, a length entry, and a key for encrypting and decrypting data on the data storage medium. A data storage medium (such as data tape) is mounted on the data storage unit, and a volume recorded on the tape is retrieved. The control unit retrieves the data structure from the key manager and matches the volume serial number recorded in the retrieved data structure with the volume serial number retrieved from the data storage medium.Type: GrantFiled: December 20, 2007Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventors: Tara L. Astigarraga, Evren O. Baran, Michael E. Browne, Christopher V. DeRobertis, Ashwin Venkatraman
-
Publication number: 20150333866Abstract: Various embodiments for regulating link speed for performance enhancement and port diagnosis are provided. In response to identifying an amount of errors in a communications link above a predetermined threshold, an applicable transmission speed is selectively reduced. The selective reduction occurs upon one of a temporary, permanent, and user-defined basis, and the selective reduction is performed using one of a manual setting adjustment and speed negotiation logic applied to the communications link. If errors identified at the reduced transmission speed are found to decrease, a communications port incorporating the communications link is flagged as potentially dirty, and if the errors identified at the reduced transmission speed are found to remain constant, the communications port is flagged as potentially bad.Type: ApplicationFiled: May 15, 2014Publication date: November 19, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara ASTIGARRAGA, Christopher V. DEROBERTIS, Louie A. DICKENS, Michael E. STARLING, Daniel J. WINARSKI
-
Patent number: 8767964Abstract: A system to improve communication security in cluster machine processing may include interconnected computers that can jointly process data. The system may also include a shared secret key used by each of the interconnected computers to encrypt, decrypt, and/or authenticate data being sent, or received, from one of the interconnected computers to another of the interconnected computers. The system may further include a new shared secret key used by each of the interconnected computers to encrypt, decrypt, and/or authenticate data being sent, or received, from one of the interconnected computers to another of the interconnected computers. In addition, the new shared secret key may coexist with the shared secret key without adversely affecting the joint processing of data performed by the plurality of interconnected computers.Type: GrantFiled: March 26, 2008Date of Patent: July 1, 2014Assignee: International Business Machines CorporationInventors: Myung M. Bae, Christopher V. DeRobertis, Robert K. Gardner, Robert R. Gensler, Jr., John R Hare, Felipe Knop, Serban C. Maerean, Johannes Sayre, Hemant R. Suri
-
Publication number: 20140177455Abstract: A method and system for monitoring and analyzing flow control of packets in a communications network which includes multiple data transmission paths. The communications network has a first data path including an initiating node and a target node. A test frame is generated by an initiator module of a program executed by a computer for transmission over the first data path. The initiator module transmits the test frame over the first data path from the initiating node to the target node, wherein the test frame records a starting timestamp recorded by the initiating node upon transmitting the test frame. The test frame records a half trip timestamp recorded by the target node upon the test frame being received by the target node. The test frame records an end timestamp recorded by the initiating node, upon the test frame being received at the initiating node from the target node.Type: ApplicationFiled: December 21, 2012Publication date: June 26, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara Astigarraga, Michael E. Browne, Christopher V. DeRobertis, Louie Arthur Dickens, Nancy J. Finn
-
Patent number: 7885412Abstract: Generic session keys are pre-generated and stored in a pool of session keys for later use in communicating within a communications environment. The session keys that are stored in the pool are pre-encrypted with the private key of the entity storing those keys. To communicate between entities, a pre-encrypted session key is extracted from the pool and then further encrypted with the destination entity's public key to ensure data integrity and data confidentiality. The encrypted key is then forwarded to the destination entity and used during communications between the two entities.Type: GrantFiled: September 29, 2005Date of Patent: February 8, 2011Assignee: International Business Machines CorporationInventors: Christopher V. DeRobertis, Robert R. Gensler, Jr., Serban C. Maerean
-
Patent number: 7873674Abstract: Disclosed are a method of and system for managing plural files registries, for use with a computer operating system having a user/group management operation. The method comprises the steps of creating a plurality of files registries, and providing an administrator with access to each of said plurality of files registries independent of all of the others of said plurality of file registries. Preferably, this is done by inserting, for each of said plurality of files registries, a respective one instruction into the user/group management operation specifying a base directory path to said each of said plurality of files registries.Type: GrantFiled: January 18, 2006Date of Patent: January 18, 2011Assignee: International Business Machines CorporationInventors: George G. Behrend, Christopher V. DeRobertis
-
Patent number: 7668831Abstract: A method, system, and program storage device for creating a new user account or user group with a unique identification number in a computing environment having multiple user registries is provided. In response to receiving a command to create a new user account or user group, an operating system of a clustered computing environment automatically checks multiple registries configured for the operating system to determine whether a candidate identification number for the new user account or user group has been assigned already to one or more existing user accounts or groups, respectively. The operating system automatically assigns the candidate identification number to the new user account or user group created in a target user registry if the checking indicates that the candidate identification number has not been assigned already to any of the existing user accounts or user groups, respectively.Type: GrantFiled: October 27, 2005Date of Patent: February 23, 2010Assignee: International Business Machines CorporationInventors: Christopher V. DeRobertis, Yantian T. Lu
-
Publication number: 20090245518Abstract: A system to improve communication security in cluster machine processing may include interconnected computers that can jointly process data. The system may also include a shared secret key used by each of the interconnected computers to encrypt, decrypt, and/or authenticate data being sent, or received, from one of the interconnected computers to another of the interconnected computers. The system may further include a new shared secret key used by each of the interconnected computers to encrypt, decrypt, and/or authenticate data being sent, or received, from one of the interconnected computers to another of the interconnected computers. In addition, the new shared secret key may coexist with the shared secret key without adversely affecting the joint processing of data performed by the plurality of interconnected computers.Type: ApplicationFiled: March 26, 2008Publication date: October 1, 2009Inventors: Myung M. Bae, Christopher V. DeRobertis, Robert K. Gardner, Robert R. Gensler, JR., John R. Hare, Felipe Knop, Serban C. Maerean, Johannes Sayre, Hemant R. Suri
-
Publication number: 20090220089Abstract: A method, apparatus and program product for encryption/decryption of data on a volume of data storage media including dividing the volume into a plurality of locations, assigning a unique key to each location for encryption/decryption of data in the respective location of the volume, mapping the locations and keys in the key manager, and encrypting/decrypting data on the volume based on the data's physical location on the volume. The owning entity owning each location on the volume may also be mapped, and the keys for each location owned by the same owning entity may be the same.Type: ApplicationFiled: February 28, 2008Publication date: September 3, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ashwin S. Venkatraman, Tara L. Astigarraga, Evren Ozan Baran, Michael E. Browne, Christopher V. DeRobertis, Maria R. Ward
-
Publication number: 20090185685Abstract: In a distributed, multinode data processing environment, computationally more intense public key cryptography is used to establish computationally less challenging symmetric key cryptographic paths which are thus enabled for longer term communication interchanges and in particular for establishing a client's network identity.Type: ApplicationFiled: January 18, 2008Publication date: July 23, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher V. DeRobertis, Robert R. Gensler, JR., Serban C. Maerean
-
Publication number: 20090164513Abstract: A data processing system having a host computer including a key manager, a control unit connected to the host computer, a data storage unit (such as a tape drive) controlled by the control unit, and data storage medium for storing data thereon to be written to or read from by the data storage unit. The key manager stores a data structure having at least one record having a volume serial number, as start location, a length entry, and a key for encrypting and decrypting data on the data storage medium. A data storage medium (such as data tape) is mounted on the data storage unit, and a volume recorded on the tape is retrieved. The control unit retrieves the data structure from the key manager and matches the volume serial number recorded in the retrieved data structure with the volume serial number retrieved from the data storage medium.Type: ApplicationFiled: December 20, 2007Publication date: June 25, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tara L. Astigarraga, Evren O. Baran, Michael E. Browne, Christopher V. DeRobertis, Ashwin Venkatraman
-
Publication number: 20070282964Abstract: Methods and apparatus for processing of a distributed remote shell command are disclosed. In some embodiments, a target host receives from a client a remote shell command specifying an operation to be performed by an operating system at the target host. The target host performs the specified operation and formulates a response that has a first part containing target host identification data for the target host and a second part showing a result of performance of the specified operation. The target host issues the response to the client.Type: ApplicationFiled: June 6, 2006Publication date: December 6, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: George G. Behrend, Christopher V. DeRobertis