Patents by Inventor David M Chess

David M Chess has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8626569
    Abstract: Performance prediction techniques are provided that utilize business-process information such as transaction history and log information. For example, in one aspect of the invention, a computer-based technique for providing a performance prediction service comprises the following steps/operations. First, business-process information associated with a business is obtained. Then, a performance estimation function is generated based at least in part on the business-process information, the performance estimation function being usable in responding to a query obtained from a potential customer of the business.
    Type: Grant
    Filed: June 4, 2008
    Date of Patent: January 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: David M. Chess, Sophia Krasikov, Alla Segal, Senthilnathan Velayudham
  • Patent number: 8458694
    Abstract: A method, information processing system, and computer readable medium for managing virtual machine imaging. The method includes receiving a request for an imaging operation associated with at least one virtual machine. A notification is sent to at least one operating system associated with the at least one virtual machine of the request for the imaging operation. The operating system is determined to be in a state for the virtual machine to be imaged. The request for the imaging operation is granting in response to determining.
    Type: Grant
    Filed: April 30, 2007
    Date of Patent: June 4, 2013
    Assignee: International Business Machines Corporation
    Inventors: David M. Chess, Sean L. Dague, Ronald T. Goering, Hidayatullah H. Shaikh, Ian N. Whalley, Steve R. White, Jian Yin
  • Patent number: 8346911
    Abstract: A system, computer program and method for inspection of a system under inspection. The system may include an inspection program configured to access information available at the system under inspection and generate inspection data for the system under inspection. A runtime platform independent from the inspection program at the system under inspection is configured to limit the limit the contents of the inspection data to a maximum information content. A trusted third-party computer system may assist in selecting the inspection program and transferring the resulting inspection data.
    Type: Grant
    Filed: March 17, 2006
    Date of Patent: January 1, 2013
    Assignee: International Business Machines Corporation
    Inventors: David M. Chess, Sophia Krasikov, David W. Levine, John F. Morar, Edward J. Pring, Alla Segal, Ian N. Whalley
  • Patent number: 7996353
    Abstract: A statistical approach implementing Singular Value Decomposition (SVD) to a policy-based management system for autonomic and on-demand computing applications. The statistical approach empowers a class of applications that require policies to handle ambiguous conditions and allow the system to “evolve” in response to changing operation and environment conditions. In the system and method providing the statistical approach, observed event-policy associated data, which is represented by an event-policy matrix, is treated as a statistical problem with the assumption that there are some underlying or implicit higher order correlations among events and policies. The SVD approach enables such correlations to be modeled, extracted and modified. From these correlations, recommended policies can be selected or created without exact match of policy conditions.
    Type: Grant
    Filed: June 2, 2008
    Date of Patent: August 9, 2011
    Assignee: International Business Machines Corporation
    Inventors: Hoi Y. Chan, David M. Chess, Thomas Y. Kwok, Steve R. White
  • Patent number: 7996905
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Grant
    Filed: April 3, 2008
    Date of Patent: August 9, 2011
    Assignee: Trend Micro Incorporated
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Patent number: 7996823
    Abstract: A mechanism to provide debugging and optimization in policy and knowledge controlled distributed computing system through the use of tagged policies is provided. An aspect of the mechanism tags one or more policies, for instance, at their creation time, execution time and/or at any other time an event that affects the policies occur. Decisions made according to policy execution or evaluation may be traced using the tags.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: August 9, 2011
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, David M. Levine, Edward Snible
  • Patent number: 7861300
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Grant
    Filed: June 18, 2008
    Date of Patent: December 28, 2010
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Patent number: 7788362
    Abstract: In one aspect this invention provides a computer program embodied on a computer readable medium that is executed by at least one data processor of a policy management system. The computer program includes first computer program instructions for implementing a user interface and second computer program instructions for implementing a policy manager that is coupled to the user interface via a policy repository for introducing a new attribute, using the first computer program instructions, into a policy for a policy-managed system, without requiring a change to (e.g., without having to re-write or re-compile) the second computer program instructions.
    Type: Grant
    Filed: March 20, 2008
    Date of Patent: August 31, 2010
    Assignee: International Business Machines Corporation
    Inventors: David M Chess, Murthy V Devarakonda, Alla Segal, Ian Nicholas Whalley
  • Patent number: 7676505
    Abstract: Users create, share, and build collaboration communities around tailored versions of the functional pages of a web site, such as the pages used to select and purchase products, or the pages used to present course materials in an online-learning site. The tailored versions of the web site are stored at the common web site development web site or at another server side location. Users access the tailored versions to select a tailored version for their own use and/or modification.
    Type: Grant
    Filed: January 27, 2006
    Date of Patent: March 9, 2010
    Assignee: International Business Machines Corporation
    Inventors: David M Chess, Alla Segal, Ian Nicholas Whalley, Jian Yin
  • Patent number: 7574524
    Abstract: A system and method for providing real-time, dynamic switching between first and second service providers each capable of providing a service for users over a communications network. The method includes steps of: establishing switching criterion for deciding when to switch service provision between the first service provider and second service provider; maintaining state information associated with a user's use of the service provided by a first service provider; switching between the first and second service provided over the communications network based on satisfaction of the switching criterion; and, migrating any state information maintained up to the time of switching to the second service. Preferably, the dynamic switching occurs in a manner substantially transparent to the user.
    Type: Grant
    Filed: September 30, 2003
    Date of Patent: August 11, 2009
    Assignee: International Business Machines Corporation
    Inventors: David F. Bantz, David M. Chess, Christos J. Georgiou, Jeffrey O. Kephart, Clifford A. Pickover
  • Patent number: 7487543
    Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
    Type: Grant
    Filed: July 23, 2002
    Date of Patent: February 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Patent number: 7480912
    Abstract: Methods for allocation of storage resources, performance monitoring, and reallocation of resources to eliminate hot spots, by specifying high-level goals, rather than by means of low-level manual steps. Policies are specified as administrator specified constraints under which the resources are managed. Goals are specified in terms of performance, availability, and security requirements of the desired storage. As a part of the automation, this invention provides a method for analyzing capabilities of the computer storage system and forming analysis results, which are later used for determining an allocation of resources that will meet the high-level goals specified. This invention also provides methods for automatic monitoring of performance, availability, and security goals for allocated resources. If goals are not met, resources are reallocated so that the goals can be met with the allocation.
    Type: Grant
    Filed: May 29, 2003
    Date of Patent: January 20, 2009
    Assignee: International Business Machines Corporation
    Inventors: William C. Arnold, David M. Chess, Murthy V. Devarakonda, Alla Segal, Ian N. Whalley
  • Publication number: 20080301630
    Abstract: A mechanism to provide debugging and optimization in policy and knowledge controlled distributed computing system through the use of tagged policies is provided. An aspect of the mechanism tags one or more policies, for instance, at their creation time, execution time and/or at any other time an event that affects the policies occur. Decisions made according to policy execution or evaluation may be traced using the tags.
    Type: Application
    Filed: May 31, 2007
    Publication date: December 4, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: William C. Arnold, David M. Chess, David M. Levine, Edward Snible
  • Publication number: 20080271016
    Abstract: A method, information processing system, and computer readable medium for managing virtual machine imaging. The method includes receiving a request for an imaging operation associated with at least one virtual machine. A notification is sent to at least one operating system associated with the at least one virtual machine of the request for the imaging operation. The operating system is determined to be in a state for the virtual machine to be imaged. The request for the imaging operation is granting in response to determining.
    Type: Application
    Filed: April 30, 2007
    Publication date: October 30, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David M. Chess, Sean L. Dague, Ronald T. Goering, Hidayatullah H. Shaikh, Ian N. Whalley, Steve R. White, Jian Yin
  • Publication number: 20080256534
    Abstract: The present invention relates to a method for the customization of virtual machine images. The method comprises identifying and retrieving a virtual machine image template. A customized virtual machine image is created from the virtual machine image template. The customized virtual machine image template being created by identifying at least one file-system or memory image that is associated with the virtual machine image template, identifying within the at least one file-system or memory image at least one data set, wherein the at least one data set comprises metadata. The metadata contains information detailing the required execution context customization aspects for at least one specified image subset of the virtual machine. Execution context-specific information that is required to customize the image subset of the virtual machine is retrieved. Further, the image subset of the virtual machine is modified in accordance with the retrieved execution context-specific information.
    Type: Application
    Filed: April 12, 2007
    Publication date: October 16, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David M. Chess, Sean L. Dague, Tamar Eilam, Ronald T. Goering, Ryan P. Grimm, James E. Hanson, Giovanni Pacifici, Benny Rochwerger, Hidayatullah H. Shaikh, Ian N. Whalley, Jian Yin
  • Publication number: 20080256633
    Abstract: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity.
    Type: Application
    Filed: June 18, 2008
    Publication date: October 16, 2008
    Inventors: William C. ARNOLD, David M. Chess, John F. Morar, Alla Segal, Ian N. Whalley, Steve R. White
  • Publication number: 20080235387
    Abstract: In one aspect this invention provides a computer program embodied on a computer readable medium that is executed by at least one data processor of a policy management system. The computer program includes first computer program instructions for implementing a user interface and second computer program instructions for implementing a policy manager that is coupled to the user interface via a policy repository for introducing a new attribute, using the first computer program instructions, into a policy for a policy-managed system, without requiring a change to (e.g., without having to re-write or re-compile) the second computer program instructions.
    Type: Application
    Filed: March 20, 2008
    Publication date: September 25, 2008
    Inventors: David M. Chess, Murthy V. Devarakonda, Alla Segal, Ian Nicholas Whalley
  • Publication number: 20080235168
    Abstract: A statistical approach implementing Singular Value Decomposition (SVD) to a policy-based management system for autonomic and on-demand computing applications. The statistical approach empowers a class of applications that require policies to handle ambiguous conditions and allow the system to “evolve” in response to changing operation and environment conditions. In the system and method providing the statistical approach, observed event-policy associated data, which is represented by an event-policy matrix, is treated as a statistical problem with the assumption that there are some underlying or implicit higher order correlations among events and policies. The SVD approach enables such correlations to be modeled, extracted and modified. From these correlations, recommended policies can be selected or created without exact match of policy conditions.
    Type: Application
    Filed: June 2, 2008
    Publication date: September 25, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hoi Y. Chan, David M. Chess, Thomas Y. Kwok, Steve R. White
  • Publication number: 20080235080
    Abstract: Performance prediction techniques are provided that utilize business-process information such as transaction history and log information. For example, in one aspect of the invention, a computer-based technique for providing a performance prediction service comprises the following steps/operations. First, business-process information associated with a business is obtained. Then, a performance estimation function is generated based at least in part on the business-process information, the performance estimation function being usable in responding to a query obtained from a potential customer of the business.
    Type: Application
    Filed: June 4, 2008
    Publication date: September 25, 2008
    Applicant: International Business Machines Corporation
    Inventors: David M. Chess, Sophia Krasikov, Alla Segal, Senthilnathan Velayudham
  • Patent number: 7412503
    Abstract: In one aspect this invention provides a computer program embodied on a computer readable medium that is executed by at least one data processor of a policy management system. The computer program includes first computer program instructions for implementing a user interface and second computer program instructions for implementing a policy manager that is coupled to the user interface via a policy repository for introducing a new attribute, using the first computer program instructions, into a policy for a policy-managed system, without requiring a change to (e.g., without having to re-write or re-compile) the second computer program instructions.
    Type: Grant
    Filed: November 21, 2003
    Date of Patent: August 12, 2008
    Assignee: International Business Machines Corporation
    Inventors: David M Chess, Murthy V Devarakonda, Alla Segal, Ian Nicholas Whalley