Patents by Inventor David Solin
David Solin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9875135Abstract: Systems and methods implementing utility-maximized scheduling of time-sensitive tasks in a resource constrained-environment are described herein. Some embodiments include a method for utility-optimized scheduling of computer system tasks performed by a processor of a first computer system that includes determining a time window including a candidate schedule of a new task to be executed on a second computer system, identifying other tasks scheduled to be executed on the second computer system within said time window, and identifying candidate schedules that each specifies the execution times for at least one of the tasks (which include the new task and the other tasks). The method further includes calculating an overall utility for each candidate schedule based upon a task utility calculated for each of the tasks when scheduled according to each corresponding candidate schedule and queuing the new task for execution according to a preferred schedule with the highest overall utility.Type: GrantFiled: October 14, 2014Date of Patent: January 23, 2018Assignee: BMC Software, Inc.Inventors: Jeffrey E. Piazza, Michael Theroux, David A. Solin
-
Patent number: 9489499Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.Type: GrantFiled: April 30, 2014Date of Patent: November 8, 2016Assignee: BLADELOGIC, INC.Inventors: Denis Knjazihhin, Paul A. Reilly, Chet Birger, David A. Solin, Carl Adams
-
Publication number: 20150033237Abstract: Systems and methods implementing utility-maximized scheduling of time-sensitive tasks in a resource constrained-environment are described herein. Some embodiments include a method for utility-optimized scheduling of computer system tasks performed by a processor of a first computer system that includes determining a time window including a candidate schedule of a new task to be executed on a second computer system, identifying other tasks scheduled to be executed on the second computer system within said time window, and identifying candidate schedules that each specifies the execution times for at least one of the tasks (which include the new task and the other tasks). The method further includes calculating an overall utility for each candidate schedule based upon a task utility calculated for each of the tasks when scheduled according to each corresponding candidate schedule and queuing the new task for execution according to a preferred schedule with the highest overall utility.Type: ApplicationFiled: October 14, 2014Publication date: January 29, 2015Inventors: Jeffrey E. PIAZZA, Michael THEROUX, David A. SOLIN
-
Patent number: 8875143Abstract: Systems and methods implementing utility-maximized scheduling of time-sensitive tasks in a resource constrained-environment are described herein. Some embodiments include a method for utility-optimized scheduling of computer system tasks performed by a processor of a first computer system that includes determining a time window including a candidate schedule of a new task to be executed on a second computer system, identifying other tasks scheduled to be executed on the second computer system within said time window, and identifying candidate schedules that each specifies the execution times for at least one of the tasks (which include the new task and the other tasks). The method further includes calculating an overall utility for each candidate schedule based upon a task utility calculated for each of the tasks when scheduled according to each corresponding candidate schedule and queuing the new task for execution according to a preferred schedule with the highest overall utility.Type: GrantFiled: May 28, 2010Date of Patent: October 28, 2014Assignee: BMC Software, Inc.Inventors: Jeff Piazza, Michael Theroux, David Solin
-
Publication number: 20140237560Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.Type: ApplicationFiled: April 30, 2014Publication date: August 21, 2014Applicant: BLADELOGIC, INC.Inventors: Denis KNJAZIHHIN, Paul A. REILLY, Chet BIRGER, David A. SOLIN, Carl ADAMS
-
Patent number: 8677446Abstract: Systems, methods and computer readable media for centrally managed impersonation are described. Examples include a system having a central server and a remote shell daemon running on a remote machine, wherein a trust relationship is established between the central server and the remote shell daemon. Examples also include a method wherein a user sends the management system a request to act upon a remote machine. The management system determines whether the user is authenticated for the requested action. Upon authentication, the management system identifies an impersonation policy based on user profile and the remote machine. The management system connects to the remote machine, impersonates an elevated privilege account if required, and executes the user action on the remote machine.Type: GrantFiled: September 30, 2010Date of Patent: March 18, 2014Assignee: BMC Software, Inc.Inventors: Geert De Peuter, David Solin
-
Patent number: 8402127Abstract: Systems, methods and computer readable media for providing virtual private clouds within a public cloud are described. Examples include a method wherein a service provider deploys a primary instance of a cloud-in-a-box (CIAB) to his cloud computing system to create a public cloud. A CIAB includes adapters configured to manage virtual infrastructure of the cloud, and end-user portal and an administrative portal. A nested instance of CIAB may be deployed to one of the virtual machines, with one of the adapters of the nested instance of CIAB being connected to the end-user portal of the primary instance. An administrator of the nested instance may create his own library of virtual machine images and offer the library to the end-users of the nested CAIB instance.Type: GrantFiled: September 30, 2010Date of Patent: March 19, 2013Assignee: BMC Software, Inc.Inventor: David A. Solin
-
Publication number: 20110320598Abstract: Systems, methods and computer readable media for providing virtual private clouds within a public cloud are described. Examples include a method wherein a service provider deploys a primary instance of a cloud-in-a-box (CIAB) to his cloud computing system to create a public cloud. A CIAB includes adapters configured to manage virtual infrastructure of the cloud, and end-user portal and an administrative portal. A nested instance of CIAB may be deployed to one of the virtual machines, with one of the adapters of the nested instance of CIAB being connected to the end-user portal of the primary instance. An administrator of the nested instance may create his own library of virtual machine images and offer the library to the end-users of the nested CAIB instance.Type: ApplicationFiled: September 30, 2010Publication date: December 29, 2011Applicant: BMC SOFTWARE, INC.Inventor: David Solin
-
Publication number: 20110296499Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.Type: ApplicationFiled: May 28, 2010Publication date: December 1, 2011Applicant: BladeLogic, Inc.Inventors: Denis Knjazihhin, Paul A. Reilly, Chet Birger, David Solin, Carl Adams
-
Publication number: 20110239275Abstract: Systems, methods and computer readable media for centrally managed impersonation are described. Examples include a system having a central server and a remote shell daemon running on a remote machine, wherein a trust relationship is established between the central server and the remote shell daemon. Examples also include a method wherein a user sends the management system a request to act upon a remote machine. The management system determines whether the user is authenticated for the requested action. Upon authentication, the management system identifies an impersonation policy based on user profile and the remote machine. The management system connects to the remote machine, impersonates an elevated privilege account if required, and executes the user action on the remote machine.Type: ApplicationFiled: September 30, 2010Publication date: September 29, 2011Applicant: BMC Software Inc.Inventors: Geert De Peuter, David Solin
-
Publication number: 20110161964Abstract: Systems and methods implementing utility-maximized scheduling of time-sensitive tasks in a resource constrained-environment are described herein. Some embodiments include a method for utility-optimized scheduling of computer system tasks performed by a processor of a first computer system that includes determining a time window including a candidate schedule of a new task to be executed on a second computer system, identifying other tasks scheduled to be executed on the second computer system within said time window, and identifying candidate schedules that each specifies the execution times for at least one of the tasks (which include the new task and the other tasks). The method further includes calculating an overall utility for each candidate schedule based upon a task utility calculated for each of the tasks when scheduled according to each corresponding candidate schedule and queuing the new task for execution according to a preferred schedule with the highest overall utility.Type: ApplicationFiled: May 28, 2010Publication date: June 30, 2011Applicant: BMC Software, Inc.Inventors: Jeff Piazza, Michael Theroux, David Solin
-
Publication number: 20110154353Abstract: Systems and methods implementing a demand-driven workload scheduling optimization of shared resources used to execute tasks submitted to a computer system are disclosed. Some embodiments include a method for demand-driven computer system resource optimization that includes receiving a request to execute a task (said request including the task's required execution time and resource requirements), selecting a prospective execution schedule meeting the required execution time and a computer system resource meeting the resource requirement, determining (in response to the request) a task execution price for using the computer system resource according to the prospective execution schedule, and scheduling the task to execute using the computer system resource according to the prospective execution schedule if the price is accepted.Type: ApplicationFiled: April 30, 2010Publication date: June 23, 2011Applicant: BMC SOFTWARE, INC.Inventors: Michael Theroux, Jeff Piazza, David Solin
-
Patent number: 7512635Abstract: A method and system updates files or other information on a computer system. Updates received are installed, and then additional updates are requested in a specified order.Type: GrantFiled: May 14, 2001Date of Patent: March 31, 2009Assignee: BMC Software, Inc.Inventor: David A. Solin