Patents by Inventor Craig Lawton
Craig Lawton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11582027Abstract: A device management service of a provider network maintain a device repository that is accessible to a remote managed network. The device management service assigns different service credentials for different edge devices indicated by the device repository. For a particular edge device, the device management service provides, based on the service credentials assigned for the edge device, secure transmission of a message between the device management service and a network manager of the managed network. The network manager of the managed network provides secure transmission of the message between the network manager and the edge device based on local credentials assigned for the edge device.Type: GrantFiled: June 28, 2019Date of Patent: February 14, 2023Assignee: Amazon Technologies, Inc.Inventor: Craig Lawton
-
Patent number: 10740201Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.Type: GrantFiled: April 11, 2018Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, Puthukode G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
-
Publication number: 20180267871Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.Type: ApplicationFiled: April 11, 2018Publication date: September 20, 2018Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, Puthukode G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
-
Patent number: 10042724Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.Type: GrantFiled: June 22, 2016Date of Patent: August 7, 2018Assignee: International Business Machines CorporationInventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, Puthukode G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
-
Publication number: 20160306721Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.Type: ApplicationFiled: June 22, 2016Publication date: October 20, 2016Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P.G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
-
Patent number: 9411697Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.Type: GrantFiled: September 24, 2012Date of Patent: August 9, 2016Assignee: International Business Machines CorporationInventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P. G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
-
Patent number: 8606659Abstract: A system for establishing and maintaining inventories of computing environment assets comprising one or more custom collector interfaces that detect movement of assets from one environment to another, and an inventory scanner which modifies inventories for each environment based on monitored asset movements. The present invention is of especial benefit to autonomic and on-demand computing architectures.Type: GrantFiled: December 22, 2008Date of Patent: December 10, 2013Assignee: International Business Machines CorporationInventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, Puthukode G. Ramachandran, Lorin Evan Ullmann, John Whitfield
-
Patent number: 8311991Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.Type: GrantFiled: May 11, 2011Date of Patent: November 13, 2012Assignee: International Business Machines CorporationInventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, Puthukode G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
-
Patent number: 8301643Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.Type: GrantFiled: May 11, 2011Date of Patent: October 30, 2012Assignee: International Business Machines CorporationInventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P. G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
-
Publication number: 20110214010Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.Type: ApplicationFiled: May 11, 2011Publication date: September 1, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORP.Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P.G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
-
Publication number: 20110214009Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.Type: ApplicationFiled: May 11, 2011Publication date: September 1, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORP.Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P.G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
-
Patent number: 7953703Abstract: Near clones for a set of targeted computing systems are provided by evaluating different configurations of the targeted computing systems including lists of installed hardware components and installed software components; determining a subset of components in common among the different configurations; determining an initial pseudo-clone configuration including the subset of components and excluding components which are not in common among the different target hardware configurations; for each of the targeted computing systems, producing a finish-out workflow of installation steps and components to be installed into an incompletely configured computer system according to the pseudo-clone configuration to produce an operational clone system; and outputting the pseudo-clone configuration and the workflow to a provisioning management system for subsequent realization of a pseudo-clone backup computing system and further subsequent realization of one or more operational clone systems.Type: GrantFiled: February 17, 2005Date of Patent: May 31, 2011Assignee: International Business Machines CorporationInventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P. G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
-
Publication number: 20090099942Abstract: A system for establishing and maintaining inventories of computing environment assets comprising one or more custom collector interfaces that detect movement of assets from one environment to another, and an inventory scanner which modifies inventories for each environment based on monitored asset movements. The present invention is of especial benefit to autonomic and on-demand computing architectures.Type: ApplicationFiled: December 22, 2008Publication date: April 16, 2009Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P. G. Ramachandran, Lorin Evan Ullmann, John Whitfield
-
Patent number: 7499865Abstract: Environment asset inventories of computing environment assets are arranged into computing environments, and at least one collector interface is disposed between the environments to detect movement of an asset and to produce asset movement reports. Upon receipt of a movement report, one or more backup copies of a environment asset inventory are accessed, and compared a modified environment asset inventory. A history of each asset in each inventory is maintained. A history report regarding the life of an asset from first introduction into an environment throughout movements between environments is produced, including any applicable patches and upgrades configured into an environment. A discrepancy report is generated including assets, locations, status, and a revision level indicators.Type: GrantFiled: December 17, 2004Date of Patent: March 3, 2009Assignee: International Business Machines CorporationInventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, Puthukode G. Ramachandran, Lorin Evan Ullmann, John Whitfield
-
Publication number: 20060190775Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.Type: ApplicationFiled: February 17, 2005Publication date: August 24, 2006Applicant: International Business Machines CorporationInventors: Vijay Aggarwal, Craig Lawton, Christopher Peters, P.G. Ramachandran, Lorin Ullmann, John Whitfield
-
Publication number: 20060178953Abstract: A system for establishing and maintaining inventories of computing environment assets comprising one or more custom collector interfaces that detect movement of assets from one environment to another, and an inventory scanner which modifies inventories for each environment based on monitored asset movements. The present invention is of especial benefit to autonomic and on-demand computing architectures.Type: ApplicationFiled: December 17, 2004Publication date: August 10, 2006Applicant: International Business Machines CorporationInventors: Vijay Aggarwal, Craig Lawton, Christopher Peters, P.G. Ramachandran, Lorin Ullmann, John Whitfield
-
Publication number: 20060136490Abstract: Workflows for execution by an autonomic provision management system to yield near clones and replacement systems for a set of targeted computing solutions are provided by determining a common denominator set of workflow steps among the workflows for the targeted computing systems, including workflows to morph a near clone to a specific targeted solution when executed a provisioning management system. Common portions of workflows are identified and archived as workflow templates for re-use in development of new workflows, thus virtualizing the process of subsequent workflow design which use the templates. Multi-level criteria-based searching is provided to workflow designers for finding and re-using existing workflows and workflow templates according to degree of matching common steps, quickest implementation, highest available, or other criteria.Type: ApplicationFiled: December 17, 2004Publication date: June 22, 2006Applicant: International Business Machines CorporationInventors: Vijay Aggarwal, Craig Lawton, Christopher Peters, P.G. Ramachandran, Lorin Ullmann, John Whitfield
-
Publication number: 20060106801Abstract: A method, computer program product and system for protecting the location of an installed middleware application. An installer program may generate a private/public key pair at build time of a middleware application. Upon the installer program installing the middleware application, the installation location of the middleware application may be encrypted using the generated private key and then discarding the private key. The encrypted installation location of the middleware application may be decrypted by a subsequent installer program upon receiving a public key from the developer of the middleware application. Since the public key was not shipped with the middleware application, an illegitimate program, such as a Trojan horse, may not be able to decrypt the installation location of the middleware application. Since the public key may only be obtained from the developer of the middleware application, only legitimate programs may be able to decrypt the location of the installed middleware application.Type: ApplicationFiled: November 12, 2004Publication date: May 18, 2006Applicant: International Business Machines CorporationInventors: David Cox, Craig Lawton, Jonathan Lewis, Christopher Peters, Lorin Ullmann, Douglas Wood
-
Publication number: 20060106821Abstract: A method, computer program product and system for determining ownership of containers. An installer program may edit stored information, such as ownership, about software component(s) it installed in a container. Upon a subsequent installer program planning to install a software component in that container, software, referred to as a “collector,” may identify the owners of the software components stored in that container. The collector may then search the rules in a rules database to determine the ownership of the container based on the ownership of the software components in the container. By mapping the software components stored in a container with their respective owners, the ownership of a container may be determined.Type: ApplicationFiled: November 12, 2004Publication date: May 18, 2006Applicant: International Business Machines CorporationInventors: David Cox, Craig Lawton, Jonathan Lewis, Christopher Peters, Lorin Ullmann
-
Publication number: 20060070061Abstract: A method, computer program product and system for allowing multiple decisions to be made by multiple decision makers during software installation. A developer of an installer program may select the decisions to be made during the installation process. The developer may further designate the decision makers to handle each of these decisions in a configuration file. The configuration file may be compiled into executable code where the executable code may be embedded in the installer program. By the developer designating multiple decision makers to handle multiple decisions, multiple decision makers may now be able to be involved during the software installation process.Type: ApplicationFiled: September 30, 2004Publication date: March 30, 2006Applicant: International Business Machines CorporationInventors: David Cox, Craig Lawton, Jonathan Lewis, Christopher Peters, Lorin Ullmann