Patents by Inventor David Solin

David Solin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9875135
    Abstract: Systems and methods implementing utility-maximized scheduling of time-sensitive tasks in a resource constrained-environment are described herein. Some embodiments include a method for utility-optimized scheduling of computer system tasks performed by a processor of a first computer system that includes determining a time window including a candidate schedule of a new task to be executed on a second computer system, identifying other tasks scheduled to be executed on the second computer system within said time window, and identifying candidate schedules that each specifies the execution times for at least one of the tasks (which include the new task and the other tasks). The method further includes calculating an overall utility for each candidate schedule based upon a task utility calculated for each of the tasks when scheduled according to each corresponding candidate schedule and queuing the new task for execution according to a preferred schedule with the highest overall utility.
    Type: Grant
    Filed: October 14, 2014
    Date of Patent: January 23, 2018
    Assignee: BMC Software, Inc.
    Inventors: Jeffrey E. Piazza, Michael Theroux, David A. Solin
  • Patent number: 9489499
    Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.
    Type: Grant
    Filed: April 30, 2014
    Date of Patent: November 8, 2016
    Assignee: BLADELOGIC, INC.
    Inventors: Denis Knjazihhin, Paul A. Reilly, Chet Birger, David A. Solin, Carl Adams
  • Publication number: 20150033237
    Abstract: Systems and methods implementing utility-maximized scheduling of time-sensitive tasks in a resource constrained-environment are described herein. Some embodiments include a method for utility-optimized scheduling of computer system tasks performed by a processor of a first computer system that includes determining a time window including a candidate schedule of a new task to be executed on a second computer system, identifying other tasks scheduled to be executed on the second computer system within said time window, and identifying candidate schedules that each specifies the execution times for at least one of the tasks (which include the new task and the other tasks). The method further includes calculating an overall utility for each candidate schedule based upon a task utility calculated for each of the tasks when scheduled according to each corresponding candidate schedule and queuing the new task for execution according to a preferred schedule with the highest overall utility.
    Type: Application
    Filed: October 14, 2014
    Publication date: January 29, 2015
    Inventors: Jeffrey E. PIAZZA, Michael THEROUX, David A. SOLIN
  • Patent number: 8875143
    Abstract: Systems and methods implementing utility-maximized scheduling of time-sensitive tasks in a resource constrained-environment are described herein. Some embodiments include a method for utility-optimized scheduling of computer system tasks performed by a processor of a first computer system that includes determining a time window including a candidate schedule of a new task to be executed on a second computer system, identifying other tasks scheduled to be executed on the second computer system within said time window, and identifying candidate schedules that each specifies the execution times for at least one of the tasks (which include the new task and the other tasks). The method further includes calculating an overall utility for each candidate schedule based upon a task utility calculated for each of the tasks when scheduled according to each corresponding candidate schedule and queuing the new task for execution according to a preferred schedule with the highest overall utility.
    Type: Grant
    Filed: May 28, 2010
    Date of Patent: October 28, 2014
    Assignee: BMC Software, Inc.
    Inventors: Jeff Piazza, Michael Theroux, David Solin
  • Publication number: 20140237560
    Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.
    Type: Application
    Filed: April 30, 2014
    Publication date: August 21, 2014
    Applicant: BLADELOGIC, INC.
    Inventors: Denis KNJAZIHHIN, Paul A. REILLY, Chet BIRGER, David A. SOLIN, Carl ADAMS
  • Patent number: 8677446
    Abstract: Systems, methods and computer readable media for centrally managed impersonation are described. Examples include a system having a central server and a remote shell daemon running on a remote machine, wherein a trust relationship is established between the central server and the remote shell daemon. Examples also include a method wherein a user sends the management system a request to act upon a remote machine. The management system determines whether the user is authenticated for the requested action. Upon authentication, the management system identifies an impersonation policy based on user profile and the remote machine. The management system connects to the remote machine, impersonates an elevated privilege account if required, and executes the user action on the remote machine.
    Type: Grant
    Filed: September 30, 2010
    Date of Patent: March 18, 2014
    Assignee: BMC Software, Inc.
    Inventors: Geert De Peuter, David Solin
  • Patent number: 8402127
    Abstract: Systems, methods and computer readable media for providing virtual private clouds within a public cloud are described. Examples include a method wherein a service provider deploys a primary instance of a cloud-in-a-box (CIAB) to his cloud computing system to create a public cloud. A CIAB includes adapters configured to manage virtual infrastructure of the cloud, and end-user portal and an administrative portal. A nested instance of CIAB may be deployed to one of the virtual machines, with one of the adapters of the nested instance of CIAB being connected to the end-user portal of the primary instance. An administrator of the nested instance may create his own library of virtual machine images and offer the library to the end-users of the nested CAIB instance.
    Type: Grant
    Filed: September 30, 2010
    Date of Patent: March 19, 2013
    Assignee: BMC Software, Inc.
    Inventor: David A. Solin
  • Publication number: 20110320598
    Abstract: Systems, methods and computer readable media for providing virtual private clouds within a public cloud are described. Examples include a method wherein a service provider deploys a primary instance of a cloud-in-a-box (CIAB) to his cloud computing system to create a public cloud. A CIAB includes adapters configured to manage virtual infrastructure of the cloud, and end-user portal and an administrative portal. A nested instance of CIAB may be deployed to one of the virtual machines, with one of the adapters of the nested instance of CIAB being connected to the end-user portal of the primary instance. An administrator of the nested instance may create his own library of virtual machine images and offer the library to the end-users of the nested CAIB instance.
    Type: Application
    Filed: September 30, 2010
    Publication date: December 29, 2011
    Applicant: BMC SOFTWARE, INC.
    Inventor: David Solin
  • Publication number: 20110296499
    Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.
    Type: Application
    Filed: May 28, 2010
    Publication date: December 1, 2011
    Applicant: BladeLogic, Inc.
    Inventors: Denis Knjazihhin, Paul A. Reilly, Chet Birger, David Solin, Carl Adams
  • Publication number: 20110239275
    Abstract: Systems, methods and computer readable media for centrally managed impersonation are described. Examples include a system having a central server and a remote shell daemon running on a remote machine, wherein a trust relationship is established between the central server and the remote shell daemon. Examples also include a method wherein a user sends the management system a request to act upon a remote machine. The management system determines whether the user is authenticated for the requested action. Upon authentication, the management system identifies an impersonation policy based on user profile and the remote machine. The management system connects to the remote machine, impersonates an elevated privilege account if required, and executes the user action on the remote machine.
    Type: Application
    Filed: September 30, 2010
    Publication date: September 29, 2011
    Applicant: BMC Software Inc.
    Inventors: Geert De Peuter, David Solin
  • Publication number: 20110161964
    Abstract: Systems and methods implementing utility-maximized scheduling of time-sensitive tasks in a resource constrained-environment are described herein. Some embodiments include a method for utility-optimized scheduling of computer system tasks performed by a processor of a first computer system that includes determining a time window including a candidate schedule of a new task to be executed on a second computer system, identifying other tasks scheduled to be executed on the second computer system within said time window, and identifying candidate schedules that each specifies the execution times for at least one of the tasks (which include the new task and the other tasks). The method further includes calculating an overall utility for each candidate schedule based upon a task utility calculated for each of the tasks when scheduled according to each corresponding candidate schedule and queuing the new task for execution according to a preferred schedule with the highest overall utility.
    Type: Application
    Filed: May 28, 2010
    Publication date: June 30, 2011
    Applicant: BMC Software, Inc.
    Inventors: Jeff Piazza, Michael Theroux, David Solin
  • Publication number: 20110154353
    Abstract: Systems and methods implementing a demand-driven workload scheduling optimization of shared resources used to execute tasks submitted to a computer system are disclosed. Some embodiments include a method for demand-driven computer system resource optimization that includes receiving a request to execute a task (said request including the task's required execution time and resource requirements), selecting a prospective execution schedule meeting the required execution time and a computer system resource meeting the resource requirement, determining (in response to the request) a task execution price for using the computer system resource according to the prospective execution schedule, and scheduling the task to execute using the computer system resource according to the prospective execution schedule if the price is accepted.
    Type: Application
    Filed: April 30, 2010
    Publication date: June 23, 2011
    Applicant: BMC SOFTWARE, INC.
    Inventors: Michael Theroux, Jeff Piazza, David Solin
  • Patent number: 7512635
    Abstract: A method and system updates files or other information on a computer system. Updates received are installed, and then additional updates are requested in a specified order.
    Type: Grant
    Filed: May 14, 2001
    Date of Patent: March 31, 2009
    Assignee: BMC Software, Inc.
    Inventor: David A. Solin