Patents by Inventor Dennis Sidney Goodrow
Dennis Sidney Goodrow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9152602Abstract: A pseudo-agent is disclosed herein that bridges this divide. For purposes of the discussion herein, a pseudo-agent is a machine that is installed on a fully capable host machine, such as a Windows or UNIX machine, and that gathers and evaluates content from a management server, takes actions if so instructed, and reports the results of its evaluation upstream. However, unlike an agent in a traditional management system, which inspects and acts on the local machine, the pseudo-agent actually inspects and acts on a remote device, or many remote devices.Type: GrantFiled: April 16, 2012Date of Patent: October 6, 2015Assignee: International Business Machines CorporationInventors: Lisa Ellen Lippincott, Peter James Lincroft, Peter Benjamin Loer, Jeremy Scott Spiegel, Dennis Sidney Goodrow, Gregory Mitchell Toto
-
Patent number: 8966110Abstract: An approximation of the bandwidth of the narrowest link in a network is determined by watching how fast data gets to the other end and then back again. The rate of data transmission is limited according to this approximation. Dynamic capacity of the link, i.e. the amount of data that can be in-flight at the same time, neglecting any buffers, is also tracked. The technique looks at how much data is in-flight and, if there is more data in flight than the dynamic capacity of the network, the data transmission rate is slowed down.Type: GrantFiled: September 9, 2010Date of Patent: February 24, 2015Assignee: International Business Machines CorporationInventors: Lisa Ellen Lippincott, Peter James Lincroft, Dennis Sidney Goodrow
-
Patent number: 8495157Abstract: An embodiment of the invention provides a technique that extends relevance-based computation to include computation based on information accessed from or exchanged with other agents. Mechanisms are provided by which an agent accesses or exchanges information between or among other agents and may include one or more of: central bulletin board, broadcast, direct request—pull, direct request—push, and server-routed. Architectural models of distributed decision making to facilitate a distributed and policy-based management of IT infrastructure are provided.Type: GrantFiled: September 14, 2010Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventors: Dennis Sidney Goodrow, Amrit Tsering Williams, Gregory Mitchell Toto, Peter Benjamin Loer
-
Publication number: 20120203818Abstract: A pseudo-agent is disclosed herein that bridges this divide. For purposes of the discussion herein, a pseudo-agent is a machine that is installed on a fully capable host machine, such as a Windows or UNIX machine, and that gathers and evaluates content from a management server, takes actions if so instructed, and reports the results of its evaluation upstream. However, unlike an agent in a traditional management system, which inspects and acts on the local machine, the pseudo-agent actually inspects and acts on a remote device, or many remote devices.Type: ApplicationFiled: April 16, 2012Publication date: August 9, 2012Applicant: International Business Machines CorporationInventors: Lisa Ellen LIPPINCOTT, Peter James Lincroft, Peter Benjamin Loer, Jeremy Scott Spiegel, Dennis Sidney Goodrow, Gregory Mitchell Toto
-
Patent number: 8161149Abstract: A pseudo-agent is disclosed herein that bridges this divide. For purposes of the discussion herein, a pseudo-agent is a machine that is installed on a fully capable host machine, such as a Windows or UNIX machine, and that gathers and evaluates content from a management server, takes actions if so instructed, and reports the results of its evaluation upstream. However, unlike an agent in a traditional management system, which inspects and acts on the local machine, the pseudo-agent actually inspects and acts on a remote device, or many remote devices.Type: GrantFiled: March 7, 2008Date of Patent: April 17, 2012Assignee: International Business Machines CorporationInventors: Lisa Ellen Lippincott, Peter James Lincroft, Peter Benjamin Loer, Jeremy Scott Spiegel, Dennis Sidney Goodrow, Gregory Mitchell Toto
-
Patent number: 8055617Abstract: A console for an enterprise suite is disclosed. The enterprise suite addresses the increasingly complex problem of keeping critical systems updated, compatible, and free of security holes. It uses Fixlet® technology to identify vulnerable computers on the network and then allows authorized personnel to correct problems across any subset of the network with a few simple mouse-clicks. The enterprise suite helps keep the networked computers updated and properly patched, all from a central console which, along with supporting architectural enhancements, is the subject matter of this document. The invention allows rolling out a security patch in minutes instead of months, thus allowing an administrator to stay ahead of potential hacker attacks. The invention also makes it possible to track the progress of each computer as updates are applied, thus making it simple to gauge the level of compliance across the entire enterprise.Type: GrantFiled: June 19, 2008Date of Patent: November 8, 2011Assignee: International Business Machines CorporationInventors: David Salim Hindawi, David Leigh Donoho, Lisa Ellen Lippincott, Dennis Sidney Goodrow, James Milton Brown, Peter James Lincroft, Peter Benjamin Loer, Orion Yosef Hindawi
-
Patent number: 7962610Abstract: An embodiment of the invention provides a technique that allows the collection, storage, and manipulation of data collected in a computer network.Type: GrantFiled: March 7, 2008Date of Patent: June 14, 2011Assignee: International Business Machines CorporationInventors: Lisa Ellen Lippincott, John Edward Firebaugh, Dennis Sidney Goodrow
-
Publication number: 20110066752Abstract: An approximation of the bandwidth of the narrowest link in a network is determined by watching how fast data gets to the other end and then back again. The rate of data transmission is limited according to this approximation. Dynamic capacity of the link, i.e. the amount of data that can be in-flight at the same time, neglecting any buffers, is also tracked. The technique looks at how much data is in-flight and, if there is more data in flight than the dynamic capacity of the network, the data transmission rate is slowed down.Type: ApplicationFiled: September 9, 2010Publication date: March 17, 2011Inventors: Lisa Ellen LIPPINCOTT, Peter James Lincroft, Dennis Sidney Goodrow
-
Publication number: 20110066841Abstract: A policy-driven communication and management infrastructure may include components such as Agent, Server and Console, policy messages, and Relays to deliver security and system management to networked devices. An Agent resides on a Client, acting as a universal policy engine for delivering multiple management services. Relays, Clients additionally configured to each behave as though they were a root Server, Relaying information to and from other Clients, permit Clients to interact with the root Server through the Relay, enabling information exchange between Client and Server. Such information exchange allows Clients to gather information, such as new policy messages, from the Server, to pass status messages to the Server and to register their network address so that they can be readily located. Automatic Relay selection enables Clients and Relays to select their own parent Relays, thus allowing Clients and Relays to discover new routing paths through the network without administrator input.Type: ApplicationFiled: September 14, 2010Publication date: March 17, 2011Inventors: Dennis Sidney GOODROW, Peter Benjamin Loer, Christopher Jacob Loer, Jonathan Shih-Shuo Fan, Gregory Mitchell Toto, Amrit Tsering Williams, John Edward Firebaugh, Jeremy Scott Spiegel, Jesse Ward-Karet, Benjamin John Kus
-
Publication number: 20110029626Abstract: An embodiment of the invention provides a technique that extends relevance-based computation to include computation based on information accessed from or exchanged with other agents. Mechanisms are provided by which an agent accesses or exchanges information between or among other agents and may include one or more of: central bulletin board, broadcast, direct request—pull, direct request—push, and server-routed. Architectural models of distributed decision making to facilitate a distributed and policy-based management of IT infrastructure are provided.Type: ApplicationFiled: September 14, 2010Publication date: February 3, 2011Inventors: Dennis Sidney GOODROW, Amrit Tsering Williams, Gregory Mitchell Toto, Peter Benjamin Loer
-
Publication number: 20100332640Abstract: Visibility and control are provided for a variety of different assets as found in a particular networked environment, such as, for example an enterprise network environment. Visibility and control of properties of assets are achieved by way of native agents, pseudo-agents that provide visibility and control of properties of assets of external systems by inspecting and applying changes into such assets, and bridges that provide visibility of other external data sources that cannot be controlled. A technique is provided that brings such visibility and control into a unified view that can be displayed in front of a console operator, for example. The controllable assets may be managed directly from the unified view at the console.Type: ApplicationFiled: September 14, 2010Publication date: December 30, 2010Inventors: Dennis Sidney GOODROW, Peter Benjamin LOER, Jeremy Scott SPIEGEL, Gregory Mitchell TOTO, Benjamin John KUS, Jonathan Shih-Shuo FAN
-
Publication number: 20080320006Abstract: A console for an enterprise suite is disclosed. The enterprise suite addresses the increasingly complex problem of keeping critical systems updated, compatible, and free of security holes. It uses Fixlet® technology to identify vulnerable computers on the network and then allows authorized personnel to correct problems across any subset of the network with a few simple mouse-clicks. The enterprise suite helps keep the networked computers updated and properly patched, all from a central console which, along with supporting architectural enhancements, is the subject matter of this document. The invention allows rolling out a security patch in minutes instead of months, thus allowing an administrator to stay ahead of potential hacker attacks. The invention also makes it possible to track the progress of each computer as updates are applied, thus making it simple to gauge the level of compliance across the entire enterprise.Type: ApplicationFiled: June 19, 2008Publication date: December 25, 2008Inventors: David Salim Hindawi, David Leigh Donoho, Lisa Ellen Lippincott, Dennis Sidney Goodrow, James Milton Brown, Peter James Lincroft, Peter Benjamin Loer, Orion Yosef Hindawi
-
Publication number: 20080228442Abstract: An embodiment of the invention provides a technique that allows the collection, storage, and manipulation of data collected in a computer network.Type: ApplicationFiled: March 7, 2008Publication date: September 18, 2008Inventors: Lisa Ellen Lippincott, John Edward Firebaugh, Dennis Sidney Goodrow
-
Publication number: 20080222296Abstract: A method and apparatus for synchronizing network element state when a network connection between a plurality of servers is restored after a network failure includes a plurality of objects that exist within the network. Each object exists in a plurality of different versions, in which each said different object version results from modifications to an object made by different servers during the network failure when the servers are unable to communicate with each other but otherwise continue to function. Each object comprises a vector including a separate version number for each server, in which each server increments its version number in the vector when it modifies the object. An automatic conflict resolution mechanism provides, at each server, a most up to date view of all objects across all of said plurality of servers upon restoration of the network connection between said plurality of servers after said network failure.Type: ApplicationFiled: March 7, 2008Publication date: September 11, 2008Inventors: Lisa Ellen LIPPINCOTT, Peter James Lincroft, Peter Benjamin Loer, John Edward Firebaugh, Dennis Sidney Goodrow
-
Publication number: 20080222280Abstract: A pseudo-agent is disclosed herein that bridges this divide. For purposes of the discussion herein, a pseudo-agent is a machine that is installed on a fully capable host machine, such as a Windows or UNIX machine, and that gathers and evaluates content from a management server, takes actions if so instructed, and reports the results of its evaluation upstream. However, unlike an agent in a traditional management system, which inspects and acts on the local machine, the pseudo-agent actually inspects and acts on a remote device, or many remote devices.Type: ApplicationFiled: March 7, 2008Publication date: September 11, 2008Inventors: Lisa Ellen LIPPINCOTT, Peter James Lincroft, Peter Benjamin Loer, Jeremy Scott Spiegel, Dennis Sidney Goodrow, Gregory Mitchell Toto